diff --git a/graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a07f18fa1c98c5cfb9d238a07387d5050e38ae37
--- /dev/null
+++ b/graph/incidents_graphml/a/a03da520-2885-11ee-ab6d-398d68629c7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.89
+ 100.64.48.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690026488
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a03da520-2885-11ee-ab6d-398d68629c7b
+
+
+
diff --git a/graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml b/graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fe31b17ea7b173336c3b8cd4f0890c6aac7b178
--- /dev/null
+++ b/graph/incidents_graphml/a/a03ddf60-9827-11ee-bcb2-fb3968bcff94.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702300645
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a03ddf60-9827-11ee-bcb2-fb3968bcff94
+
+
+
diff --git a/graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f84447f03ca10b4da196b3dcecf413d85b53070d
--- /dev/null
+++ b/graph/incidents_graphml/a/a04b50e0-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.135
+ 100.64.10.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703520
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a04b50e0-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml b/graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87cf7f93465d9109f281036af56dd57eaabe3300
--- /dev/null
+++ b/graph/incidents_graphml/a/a04c3740-9827-11ee-bcb2-fb3968bcff94.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702300645
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a04c3740-9827-11ee-bcb2-fb3968bcff94
+
+
+
diff --git a/graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b812cd7d725b45265233616e646ead1cd0c84eca
--- /dev/null
+++ b/graph/incidents_graphml/a/a06637e0-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.128.193
+ 192.168.128.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.197
+ 100.64.72.197
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687192668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a06637e0-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a06637e0-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00beaa0d5e0dde97d9b5b440a54f00aaab8c7e16
--- /dev/null
+++ b/graph/incidents_graphml/a/a06abf20-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.147
+ 100.64.38.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170771
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a06abf20-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83d232685aaa91553bec67c7929eaef38362edf5
--- /dev/null
+++ b/graph/incidents_graphml/a/a06e92f0-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014566
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a06e92f0-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c02d39bb01e99f1b6d5d957e65c640b014df6725
--- /dev/null
+++ b/graph/incidents_graphml/a/a0737940-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.119
+ 100.64.7.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495166
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0737940-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5a5b5011779036ed71ec8eeb05dec7534c99b50
--- /dev/null
+++ b/graph/incidents_graphml/a/a076d5f0-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.119
+ 100.64.18.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780421
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a076d5f0-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e6a0a1f84581c35b9959cc6b18067b326ead1f8
--- /dev/null
+++ b/graph/incidents_graphml/a/a07db700-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.222
+ 100.64.46.222
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146262
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a07db700-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e32b792dc1c067c7b14ef48f13ffe5223226a74
--- /dev/null
+++ b/graph/incidents_graphml/a/a085ca10-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.119
+ 100.64.18.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780421
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a085ca10-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a6724b22dfcf881b2db6077ba7d3716360471c2
--- /dev/null
+++ b/graph/incidents_graphml/a/a08be340-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.57
+ USER-0015-1487.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495166
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a08be340-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d316b2c9cedc80526a0c9a932fbd65bf60f4a582
--- /dev/null
+++ b/graph/incidents_graphml/a/a08d0e50-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.18
+ 100.64.55.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a08d0e50-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8a6c05f02abc5a09b0f31263cab6180ac35cff4
--- /dev/null
+++ b/graph/incidents_graphml/a/a0907bb0-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.222
+ 100.64.46.222
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146262
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0907bb0-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4034e31c4c9faff949aba9b326fd1e32754f975
--- /dev/null
+++ b/graph/incidents_graphml/a/a0926ea0-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0926ea0-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5688d421197bf375b88c120dc7ef8971fe2d1f94
--- /dev/null
+++ b/graph/incidents_graphml/a/a092c260-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.161
+ 100.64.15.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780421
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a092c260-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4f794ff9b0e9499074aad7482fa841f73c1ebd3
--- /dev/null
+++ b/graph/incidents_graphml/a/a0a3fad0-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0a3fad0-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef1aab874d011a2d618eff3e7948201d58c819ba
--- /dev/null
+++ b/graph/incidents_graphml/a/a0a4c270-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.57
+ USER-0015-1487.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495166
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0a4c270-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..522bbf4cf1dffc89406dead6836fdba829f97fbb
--- /dev/null
+++ b/graph/incidents_graphml/a/a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.207
+ 100.64.9.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0a7ffe0-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9dfd09f37abcdc9904c3d1ccf373745e74588e96
--- /dev/null
+++ b/graph/incidents_graphml/a/a0abefb0-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.121
+ 100.64.18.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780421
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0abefb0-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bdfa35acee6455f9d3118d6b6ad01e3662b2d78
--- /dev/null
+++ b/graph/incidents_graphml/a/a0b410e0-0861-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.204
+ 100.64.14.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.205
+ 100.64.14.205
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.206
+ 100.64.14.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.207
+ 100.64.14.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.208
+ 100.64.14.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.47
+ 100.64.8.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.209
+ 100.64.14.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.201
+ 100.64.13.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640087
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0b410e0-0861-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46e51e7202d80af322d811447093c353a96f8b61
--- /dev/null
+++ b/graph/incidents_graphml/a/a0b5ae10-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0b5ae10-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cff6d01dff1f0d0f1810a88a457a5364828dd12f
--- /dev/null
+++ b/graph/incidents_graphml/a/a0ba7670-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.207
+ 100.64.9.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458299
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0ba7670-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16055a4a5bd609da56d6d12400427fe5fafd23f3
--- /dev/null
+++ b/graph/incidents_graphml/a/a0bf5340-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.116
+ 100.64.73.116
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690855417
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0bf5340-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a09da861272b922175daf961db2155aba0e6706
--- /dev/null
+++ b/graph/incidents_graphml/a/a0c1c570-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.17
+ 100.64.24.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.76.201
+ 100.64.76.201
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766310
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c1c570-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766310
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c1c570-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766310
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c1c570-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766310
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c1c570-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca87dbf891de7f22ae59e8e45bc6e178379a49e3
--- /dev/null
+++ b/graph/incidents_graphml/a/a0c872c0-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014566
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0c872c0-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80e51a528307bf2921fa0a2a4450b0e656ea52ba
--- /dev/null
+++ b/graph/incidents_graphml/a/a0c9c8b0-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.9
+ 100.64.34.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.10
+ 100.64.34.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.179
+ 100.64.15.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.11
+ 100.64.34.11
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.12
+ 100.64.34.12
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.13
+ 100.64.34.13
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.230
+ 100.64.10.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.73
+ 100.64.27.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.14
+ 100.64.34.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.15
+ 100.64.34.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087740
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0c9c8b0-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89b8a9c8293e009f0e45ae58a95fbde7fe44f8e8
--- /dev/null
+++ b/graph/incidents_graphml/a/a0cc50c0-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.210
+ 100.64.9.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0cc50c0-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ae5d265314f3c50028932f30fad280f7aa3263c
--- /dev/null
+++ b/graph/incidents_graphml/a/a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.12
+ 100.64.80.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.25
+ HOST-13452
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.13
+ 100.64.80.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686806981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0d22020-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c38b9ba5b92e4c9de8473112a2baaebf304dc30
--- /dev/null
+++ b/graph/incidents_graphml/a/a0d80320-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014567
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0d80320-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40deda45f264d1829f0c0970a764f8d94fb56179
--- /dev/null
+++ b/graph/incidents_graphml/a/a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.210
+ 100.64.9.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0ddb5e0-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78c0b67da4c186f01c597515a4fcbfc76f33feae
--- /dev/null
+++ b/graph/incidents_graphml/a/a0e32ef0-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.116
+ 100.64.73.116
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690855417
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e32ef0-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a59f2968a4a8be49f7cc9adb75900b9a79525910
--- /dev/null
+++ b/graph/incidents_graphml/a/a0e3cc60-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.125
+ 100.64.80.125
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.34
+ 100.64.1.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.5
+ 100.64.74.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.32.175
+ 100.64.32.175
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0e3cc60-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37d01c4e2d9c5964e93f69818b226b03186e0b93
--- /dev/null
+++ b/graph/incidents_graphml/a/a0e5f770-6071-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.225
+ 100.64.57.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.221
+ 100.64.74.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668027666
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0e5f770-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027666
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0e5f770-6071-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abb860fba6d4a42bf1567acc3e8ce289cf1bb4d9
--- /dev/null
+++ b/graph/incidents_graphml/a/a0e6a890-182d-11ee-88ad-19cfc5af29bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.187
+ 100.64.77.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.118
+ 100.64.72.118
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0e6a890-182d-11ee-88ad-19cfc5af29bb
+
+
+
diff --git a/graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd60ae4eb632b22bbc79343cd64febd249ec8a9c
--- /dev/null
+++ b/graph/incidents_graphml/a/a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.14
+ 100.64.80.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.37
+ 100.64.76.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686806981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806981
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a0e72ec0-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6f9eff2c4318745663a8e2d4735655f4406743e
--- /dev/null
+++ b/graph/incidents_graphml/a/a0e94130-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014567
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a0e94130-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..183e318c03f5f6de2b39444476864cc6aa0926bd
--- /dev/null
+++ b/graph/incidents_graphml/a/a0f18040-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.122
+ 100.64.12.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473235
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0f18040-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f305b6cc4e34a4b489fdc20713328abf37ad45b
--- /dev/null
+++ b/graph/incidents_graphml/a/a0f18c00-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.152
+ 100.64.7.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458299
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0f18c00-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ca8fbacde58acecb9ab0be6aecdf41c0144b943
--- /dev/null
+++ b/graph/incidents_graphml/a/a0f76860-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.9
+ 100.64.34.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a0f76860-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c54a8d0dbff74f87ce361469498e58eee4132b87
--- /dev/null
+++ b/graph/incidents_graphml/a/a103db80-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.152
+ 100.64.7.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458299
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a103db80-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bc52138f1873e2a4877096036845f75a80513e7
--- /dev/null
+++ b/graph/incidents_graphml/a/a1042510-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.74
+ 100.64.14.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146263
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1042510-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54749c7926775422b07291cc0bd92b3cd3a1888d
--- /dev/null
+++ b/graph/incidents_graphml/a/a1070bd0-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.120
+ 100.64.46.120
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.20
+ 100.64.74.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.22
+ 100.64.80.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.73.58
+ 100.64.73.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1070bd0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1070bd0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1070bd0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1070bd0-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b31e4f9079425f1f17930150089da257e9324db6
--- /dev/null
+++ b/graph/incidents_graphml/a/a1105050-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.240
+ USER-0015-1481.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1105050-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20b733ebb65fefe51eed4464a76cbf9e90d80a0e
--- /dev/null
+++ b/graph/incidents_graphml/a/a113f810-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.137
+ 100.64.10.137
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703521
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a113f810-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3737d31bd154efb67137452c4881aeee8bdc3d6c
--- /dev/null
+++ b/graph/incidents_graphml/a/a1190ca0-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.74
+ 100.64.14.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146263
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1190ca0-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml b/graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dae5882735c9192276f44f5b10ed0c47da282714
--- /dev/null
+++ b/graph/incidents_graphml/a/a11f6c60-7a44-11ee-a612-0577b4410533.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.105
+ 100.64.8.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699014567
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a11f6c60-7a44-11ee-a612-0577b4410533
+
+
+
diff --git a/graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml b/graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..502ed49000d1cce32ec8b424484c0a44374821d8
--- /dev/null
+++ b/graph/incidents_graphml/a/a1202ed0-9fd7-11ee-a827-c14dee966e17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.240
+ USER-0015-1481.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703145896
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1202ed0-9fd7-11ee-a827-c14dee966e17
+
+
+
diff --git a/graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecea5942422e49f43ca37181f5e847920e3707e3
--- /dev/null
+++ b/graph/incidents_graphml/a/a13104f0-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.128
+ 100.64.48.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405575
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a13104f0-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17bdeed745e35970651aa92817b39af1ec302d6d
--- /dev/null
+++ b/graph/incidents_graphml/a/a131b240-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.9
+ 100.64.34.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.228
+ 100.64.12.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.23
+ 100.64.34.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.24
+ 100.64.34.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.25
+ 100.64.34.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.26
+ 100.64.34.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.27
+ 100.64.34.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.28
+ USER-0015-1300.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+ INCIDENT_LINK
+ 1688087741
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a131b240-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/a/a132cab0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a132cab0-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33b1599d056a915047a5c247e51c48b8e19ae431
--- /dev/null
+++ b/graph/incidents_graphml/a/a132cab0-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.139
+ 100.64.10.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703522
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a132cab0-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/a/a13ec090-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a13ec090-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bf20e5aa39af8e10e9b17ea55574ac13d203e33
--- /dev/null
+++ b/graph/incidents_graphml/a/a13ec090-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.128
+ 100.64.48.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a13ec090-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a142cfa0-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a142cfa0-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80cce8d66c494adc764b85737991447da6a57f21
--- /dev/null
+++ b/graph/incidents_graphml/a/a142cfa0-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,713 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.9
+ 100.64.55.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.12
+ 100.64.55.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.91
+ 100.64.18.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.111
+ 100.64.5.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.13
+ 100.64.55.13
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.14
+ 100.64.55.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.253
+ 100.64.47.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.106
+ 100.64.2.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.212
+ 100.64.22.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.37
+ 100.64.54.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.84
+ 100.64.13.84
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.62
+ 100.64.24.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.81
+ 100.64.48.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.15
+ 100.64.55.15
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.16
+ 100.64.55.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.17
+ 100.64.55.17
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.18
+ 100.64.55.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.70
+ 100.64.37.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.248
+ 100.64.17.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.124
+ USER-0015-1334.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700170772
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a142cfa0-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/a/a143e1b0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a143e1b0-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16ef44c0b7f71404d0128c90758aedb03955c558
--- /dev/null
+++ b/graph/incidents_graphml/a/a143e1b0-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.139
+ 100.64.10.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703522
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a143e1b0-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/a/a1471790-ed79-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/a/a1471790-ed79-11ed-a662-a9c0e7c292a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..538b43a0b520f032fb7912e80a71b61701107f03
--- /dev/null
+++ b/graph/incidents_graphml/a/a1471790-ed79-11ed-a662-a9c0e7c292a4.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.189
+ 100.64.68.189
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.190
+ 100.64.68.190
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1683534217
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1471790-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534217
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1471790-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534217
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1471790-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534217
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1471790-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534217
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1471790-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534217
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1471790-ed79-11ed-a662-a9c0e7c292a4
+
+
+
diff --git a/graph/incidents_graphml/a/a14748a0-ab79-11ee-a1cb-599f1b15ded5.graphml b/graph/incidents_graphml/a/a14748a0-ab79-11ee-a1cb-599f1b15ded5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a936245da4bac8e02154eaef932b18642c06917c
--- /dev/null
+++ b/graph/incidents_graphml/a/a14748a0-ab79-11ee-a1cb-599f1b15ded5.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.238
+ 100.64.49.238
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.4
+ 100.64.30.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.239
+ 100.64.49.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.240
+ 100.64.49.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.141
+ 100.64.35.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.241
+ 100.64.49.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424938
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14748a0-ab79-11ee-a1cb-599f1b15ded5
+
+
+
diff --git a/graph/incidents_graphml/a/a14de270-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a14de270-47db-11ee-b496-6fe4711b3325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99a892efa3cf0368037fb30b66d43897dede842b
--- /dev/null
+++ b/graph/incidents_graphml/a/a14de270-47db-11ee-b496-6fe4711b3325.graphml
@@ -0,0 +1,753 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.247
+ 100.64.51.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.22
+ 100.64.18.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.2
+ 100.64.31.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.97
+ 100.64.38.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.248
+ 100.64.51.248
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.249
+ 100.64.51.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.227
+ 100.64.40.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.250
+ 100.64.51.250
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.76
+ 100.64.37.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.181
+ 100.64.31.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.14
+ 100.64.5.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.251
+ 100.64.51.251
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.252
+ USER-0015-1394.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.32
+ 100.64.27.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471912
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a14de270-47db-11ee-b496-6fe4711b3325
+
+
+
diff --git a/graph/incidents_graphml/a/a152ee70-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/a/a152ee70-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..731b3a30684ba677ef1b41730f1b2853eb8ed452
--- /dev/null
+++ b/graph/incidents_graphml/a/a152ee70-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.191
+ 100.64.77.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.109
+ 100.64.72.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689246953
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a152ee70-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246953
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a152ee70-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246953
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a152ee70-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246953
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a152ee70-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/a/a1560980-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a1560980-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa71e6fce5c56a072d5dc3966b9a81370b092d6a
--- /dev/null
+++ b/graph/incidents_graphml/a/a1560980-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170773
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1560980-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/a/a15ac510-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/a/a15ac510-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d44e7a7f61be3a5865f433958e6cc1ef5ea84140
--- /dev/null
+++ b/graph/incidents_graphml/a/a15ac510-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.141
+ 100.64.10.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703522
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a15ac510-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/a/a15fd1f0-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/a/a15fd1f0-22d3-11ef-b7cc-27d8681b231b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8122da2c612a271612f56ad4d1eae45245b862ac
--- /dev/null
+++ b/graph/incidents_graphml/a/a15fd1f0-22d3-11ef-b7cc-27d8681b231b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.54.100
+ 172.21.54.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 10.107.124.222
+ 10.107.124.222
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.161.212.239
+ 10.161.212.239
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717547781
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a15fd1f0-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547781
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a15fd1f0-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547781
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a15fd1f0-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547781
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a15fd1f0-22d3-11ef-b7cc-27d8681b231b
+
+
+
diff --git a/graph/incidents_graphml/a/a1619ee0-9827-11ee-bcb2-fb3968bcff94.graphml b/graph/incidents_graphml/a/a1619ee0-9827-11ee-bcb2-fb3968bcff94.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ccbfa6e9acaec0252d068be587ef6f54eeba17f
--- /dev/null
+++ b/graph/incidents_graphml/a/a1619ee0-9827-11ee-bcb2-fb3968bcff94.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.66
+ 100.64.18.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702300647
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a1619ee0-9827-11ee-bcb2-fb3968bcff94
+
+
+ INCIDENT_LINK
+ 1702300647
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a1619ee0-9827-11ee-bcb2-fb3968bcff94
+
+
+
diff --git a/graph/incidents_graphml/a/a1735fd0-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1735fd0-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeaa0599f3418562f532815be9e6ce0cbd62be50
--- /dev/null
+++ b/graph/incidents_graphml/a/a1735fd0-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.20
+ 100.64.75.20
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1735fd0-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a17a7300-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a17a7300-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f52a0301b9a9cdbdcbe254e315883a494a430aa
--- /dev/null
+++ b/graph/incidents_graphml/a/a17a7300-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.148
+ 100.64.81.148
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1668613930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17a7300-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17a7300-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a17c20b0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a17c20b0-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00ed31f58f6a56d1630b7fcb653dcd0eec2256a9
--- /dev/null
+++ b/graph/incidents_graphml/a/a17c20b0-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.139
+ 100.64.16.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.160
+ 100.64.72.160
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668613930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a17c20b0-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a17c20b0-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a17fec60-0861-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/a/a17fec60-0861-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ed58c0e6433434008b903ce2c014a0e6aec5121
--- /dev/null
+++ b/graph/incidents_graphml/a/a17fec60-0861-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.216
+ 100.64.14.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.217
+ 100.64.14.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.196
+ 100.64.14.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.218
+ 100.64.14.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.219
+ 100.64.14.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.220
+ 100.64.14.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.221
+ 100.64.14.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.222
+ 100.64.14.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.223
+ 100.64.14.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.224
+ 100.64.14.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.225
+ 100.64.14.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.226
+ 100.64.14.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.227
+ 100.64.14.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.228
+ 100.64.14.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.229
+ 100.64.14.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.230
+ 100.64.14.230
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.231
+ 100.64.14.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640088
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a17fec60-0861-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/a/a185af50-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a185af50-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5b0f6669da46e1409761d7645c976f73dfc09db
--- /dev/null
+++ b/graph/incidents_graphml/a/a185af50-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.20
+ 100.64.75.20
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a185af50-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a189e030-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/a/a189e030-2c8a-11ed-be76-c750f0345c87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..392fbdf2c0d3950ec5dd350c095123ce7e54782b
--- /dev/null
+++ b/graph/incidents_graphml/a/a189e030-2c8a-11ed-be76-c750f0345c87.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.77
+ 100.64.75.77
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662320944
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a189e030-2c8a-11ed-be76-c750f0345c87
+
+
+
diff --git a/graph/incidents_graphml/a/a1906dd0-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/a/a1906dd0-1ca6-11ee-8a30-871cf58c099a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6e60aa02053cfba3397abb443fcc5b8e412129c
--- /dev/null
+++ b/graph/incidents_graphml/a/a1906dd0-1ca6-11ee-8a30-871cf58c099a.graphml
@@ -0,0 +1,689 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.132
+ 100.64.54.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.208
+ 100.64.11.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.133
+ 100.64.54.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.152
+ 100.64.28.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.255
+ 100.64.20.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.134
+ 100.64.54.134
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.212
+ 100.64.30.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.135
+ 100.64.54.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.136
+ USER-0015-1405.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.137
+ 100.64.54.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.138
+ 100.64.54.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.217
+ 100.64.5.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.146
+ 100.64.8.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.163
+ 100.64.7.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.139
+ 100.64.54.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.140
+ 100.64.54.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721249
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1906dd0-1ca6-11ee-8a30-871cf58c099a
+
+
+
diff --git a/graph/incidents_graphml/a/a19566c0-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a19566c0-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4aba3e4901ede14632b1377e129109709f384c29
--- /dev/null
+++ b/graph/incidents_graphml/a/a19566c0-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.13
+ 100.64.8.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a19566c0-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/a/a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbafa73f0ed69660cc0ad9b86354135658aca9a1
--- /dev/null
+++ b/graph/incidents_graphml/a/a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.218
+ 100.64.81.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.181
+ USER-0015-1903.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656543784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543784
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a19c02c0-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+
diff --git a/graph/incidents_graphml/a/a1a4ae50-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a1a4ae50-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df8879a6242ec40d653c6d7bb428e8be2928cb15
--- /dev/null
+++ b/graph/incidents_graphml/a/a1a4ae50-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.139
+ 100.64.45.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1a4ae50-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a1a60890-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1a60890-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af5f288147e2f76f46182da852d743a37759224d
--- /dev/null
+++ b/graph/incidents_graphml/a/a1a60890-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.13
+ 100.64.8.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1a60890-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a1b59e40-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a1b59e40-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..618677b9e1eb8bced99fb120c5e5536b9a69f62f
--- /dev/null
+++ b/graph/incidents_graphml/a/a1b59e40-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.139
+ 100.64.45.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a1b59e40-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a1b91b60-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1b91b60-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99a6857f4b32819155be8756ca736f62f9a8c3ca
--- /dev/null
+++ b/graph/incidents_graphml/a/a1b91b60-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.106
+ 100.64.76.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1b91b60-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61d5594e9f0f8b2b56179134ea3d2f5f2e03f79c
--- /dev/null
+++ b/graph/incidents_graphml/a/a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703211
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1be9bd0-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/a/a1bfeb90-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/a/a1bfeb90-35bb-11ee-95a2-5f9786093780.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ccb8a8dbc7657ab94a1558dd2e69e92896170f0
--- /dev/null
+++ b/graph/incidents_graphml/a/a1bfeb90-35bb-11ee-95a2-5f9786093780.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.64.255.24
+ 10.64.255.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 10.133.95.85
+ 10.133.95.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691479048
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1bfeb90-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479048
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1bfeb90-35bb-11ee-95a2-5f9786093780
+
+
+
diff --git a/graph/incidents_graphml/a/a1c50790-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a1c50790-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a17990f5d94141d49f03fcf6359578a3a055021
--- /dev/null
+++ b/graph/incidents_graphml/a/a1c50790-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.203
+ 100.64.26.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405576
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1c50790-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a1c6e510-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a1c6e510-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bb3e439c8d4c847d83e4efd0db84563bc4f8b68
--- /dev/null
+++ b/graph/incidents_graphml/a/a1c6e510-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.135
+ 100.64.23.135
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1c6e510-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a1c7e870-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1c7e870-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bb7c688211db9591c988c82c9e851cb92660528
--- /dev/null
+++ b/graph/incidents_graphml/a/a1c7e870-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.106
+ 100.64.76.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1c7e870-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a1c86280-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a1c86280-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8145477ca591f1cdeaf11f58ade59371d2161fbc
--- /dev/null
+++ b/graph/incidents_graphml/a/a1c86280-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.146
+ 100.64.35.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773620
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1c86280-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a1c88df0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/a/a1c88df0-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a59ea9fbb4a89622d9679ba80394e87db5104556
--- /dev/null
+++ b/graph/incidents_graphml/a/a1c88df0-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.215
+ 100.64.30.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.137
+ 100.64.72.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.28.46
+ 100.64.28.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Meraki","Precinct"]
+
+
+ HOST
+ 100.64.82.125
+ 100.64.82.125
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.55
+ 100.64.82.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196571
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1c88df0-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/a/a1ce0950-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/a/a1ce0950-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..def7fb328bf7950bc2a0bdd1e452c59055cd3ee4
--- /dev/null
+++ b/graph/incidents_graphml/a/a1ce0950-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.212
+ 100.64.9.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458301
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1ce0950-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/a/a1d42b80-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a1d42b80-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fd328ec3f6289ebdbd6910730bed71c95525e9e
--- /dev/null
+++ b/graph/incidents_graphml/a/a1d42b80-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,339 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.137
+ 100.64.23.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.138
+ 100.64.23.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.139
+ 100.64.23.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.140
+ 100.64.23.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.141
+ 100.64.23.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452024
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d42b80-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a1d61e20-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a1d61e20-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0ba196e06c179ef5c9e8557bb0e184d04dee7f1
--- /dev/null
+++ b/graph/incidents_graphml/a/a1d61e20-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.85
+ 100.64.38.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1d61e20-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a1d690a0-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a1d690a0-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..662138a80233688721e7e92f2e2209ff896d0109
--- /dev/null
+++ b/graph/incidents_graphml/a/a1d690a0-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703211
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1d690a0-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/a/a1dd9350-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1dd9350-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c6b5e6cb5688e42236914c629d2066a98ed7954
--- /dev/null
+++ b/graph/incidents_graphml/a/a1dd9350-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.241
+ 100.64.77.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1dd9350-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a1deafc0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/a/a1deafc0-212f-11ef-98de-f5bd3e11f54f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e2d9a5e6163c65011afbc19a3355c8898b53510
--- /dev/null
+++ b/graph/incidents_graphml/a/a1deafc0-212f-11ef-98de-f5bd3e11f54f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.226
+ 100.64.41.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717367393
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1deafc0-212f-11ef-98de-f5bd3e11f54f
+
+
+
diff --git a/graph/incidents_graphml/a/a1e56060-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a1e56060-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0796de61998f4eb84dfc743170a19995c18586a
--- /dev/null
+++ b/graph/incidents_graphml/a/a1e56060-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.85
+ 100.64.38.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773621
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1e56060-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a1e58e30-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a1e58e30-25bc-11ef-8084-11f20777a6f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9ed8b810e9deef733d86c863b3fa72f772e5f80f
--- /dev/null
+++ b/graph/incidents_graphml/a/a1e58e30-25bc-11ef-8084-11f20777a6f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.74
+ 100.64.16.74
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717867757
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a1e58e30-25bc-11ef-8084-11f20777a6f9
+
+
+
diff --git a/graph/incidents_graphml/a/a1e85b20-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/a/a1e85b20-35bb-11ee-95a2-5f9786093780.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64a630067747abb5fa2943147eafcf471ec5bdae
--- /dev/null
+++ b/graph/incidents_graphml/a/a1e85b20-35bb-11ee-95a2-5f9786093780.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.146
+ 100.64.80.146
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.6
+ 100.64.77.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.34.250
+ 100.64.34.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.128
+ 100.64.71.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.147
+ 100.64.80.147
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1e85b20-35bb-11ee-95a2-5f9786093780
+
+
+
diff --git a/graph/incidents_graphml/a/a1eb7600-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1eb7600-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85787a491130e1e23b1c90ad2fca482b9ea4ebc4
--- /dev/null
+++ b/graph/incidents_graphml/a/a1eb7600-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.241
+ 100.64.77.241
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1eb7600-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a1ebb9e0-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a1ebb9e0-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdf14e82d49a3b890f63ae1929b15ef7a375f8f5
--- /dev/null
+++ b/graph/incidents_graphml/a/a1ebb9e0-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695254754
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1ebb9e0-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/a/a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26e7858b35aa36d0e90a56299acc0fad5f1cb5e5
--- /dev/null
+++ b/graph/incidents_graphml/a/a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703211
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a1ee5e60-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/a/a1ee7900-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a1ee7900-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79bffee3705d5806111758ab97cdcb12b6f2c733
--- /dev/null
+++ b/graph/incidents_graphml/a/a1ee7900-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695254754
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1ee7900-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/a/a1f03bf0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/a/a1f03bf0-212f-11ef-98de-f5bd3e11f54f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5daba54a5017fdf7ac991772c51bb62a1d65e315
--- /dev/null
+++ b/graph/incidents_graphml/a/a1f03bf0-212f-11ef-98de-f5bd3e11f54f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.226
+ 100.64.41.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717367393
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a1f03bf0-212f-11ef-98de-f5bd3e11f54f
+
+
+
diff --git a/graph/incidents_graphml/a/a1fab840-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a1fab840-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dd242889cb98613adaddb50c697ad45593a42a9
--- /dev/null
+++ b/graph/incidents_graphml/a/a1fab840-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.159
+ USER-0015-1787.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a1fab840-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a20ae930-1173-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/a/a20ae930-1173-11ef-98dd-db867c05f09b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4992f8648985606ac1433b7d594a4bdaacfbf17d
--- /dev/null
+++ b/graph/incidents_graphml/a/a20ae930-1173-11ef-98dd-db867c05f09b.graphml
@@ -0,0 +1,177 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.244
+ 100.64.86.244
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ 172.16.46.208
+ ["Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.53
+ 100.64.97.53
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637381
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a20ae930-1173-11ef-98dd-db867c05f09b
+
+
+
diff --git a/graph/incidents_graphml/a/a20c6b80-2ff5-11ee-90c1-6310e920c946.graphml b/graph/incidents_graphml/a/a20c6b80-2ff5-11ee-90c1-6310e920c946.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d8a91f4c68f8a9d908638a4efd3b9eb0b9fca4b
--- /dev/null
+++ b/graph/incidents_graphml/a/a20c6b80-2ff5-11ee-90c1-6310e920c946.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.159
+ USER-0015-1787.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690844252
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a20c6b80-2ff5-11ee-90c1-6310e920c946
+
+
+
diff --git a/graph/incidents_graphml/a/a20ce1e0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a20ce1e0-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09724dd83c1b7d4344dde2a869ff99e21e9ac2d8
--- /dev/null
+++ b/graph/incidents_graphml/a/a20ce1e0-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.245
+ 100.64.77.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690855419
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a20ce1e0-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/a/a21efdf0-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a21efdf0-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2005e1c5e9faa80cc3cda049e68bb0621e180d7d
--- /dev/null
+++ b/graph/incidents_graphml/a/a21efdf0-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.192
+ 100.64.24.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638427
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a21efdf0-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a23132c0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/a/a23132c0-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af98bac0885ed4def3a6d8130e4b9c352b858dbf
--- /dev/null
+++ b/graph/incidents_graphml/a/a23132c0-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.245
+ 100.64.77.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690855420
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a23132c0-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/a/a231d0a0-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a231d0a0-089f-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfdabe0e68a65c4d9ee35923ecfa564e9d95e3eb
--- /dev/null
+++ b/graph/incidents_graphml/a/a231d0a0-089f-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.67
+ 100.64.27.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686519221
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a231d0a0-089f-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/a/a232c640-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a232c640-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed19e38ed6d1d868de9d64e8a4c3bc43b7c7bbe9
--- /dev/null
+++ b/graph/incidents_graphml/a/a232c640-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,173 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.147
+ 100.64.23.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a232c640-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a232c640-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a232c640-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a232c640-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a232c640-50c5-11ee-8e23-918003f7627a
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a232c640-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a2378f00-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a2378f00-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae3ba1bc46dc22b59e9f3940063d16d3a6da0418
--- /dev/null
+++ b/graph/incidents_graphml/a/a2378f00-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.192
+ 100.64.24.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638427
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2378f00-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a23e1cc0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/a/a23e1cc0-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a900a7ff70fb6c3e4160d562cb5386d81b8a55df
--- /dev/null
+++ b/graph/incidents_graphml/a/a23e1cc0-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.133
+ 100.64.27.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315937
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a23e1cc0-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/a/a2411de0-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a2411de0-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66ace76f1f296b54b6d3f5d1f1a74c9d9e42768c
--- /dev/null
+++ b/graph/incidents_graphml/a/a2411de0-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2411de0-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+ INCIDENT_LINK
+ 1709821136
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2411de0-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a24bc140-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a24bc140-089f-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd1ad5f740ef5543b160a6affa9413ecb9952947
--- /dev/null
+++ b/graph/incidents_graphml/a/a24bc140-089f-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.69
+ 100.64.27.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686519221
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a24bc140-089f-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/a/a24dc850-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a24dc850-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a327f0b8fff576716909b8edfcd6656def614b2
--- /dev/null
+++ b/graph/incidents_graphml/a/a24dc850-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.149
+ 100.64.23.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a24dc850-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a255a5b0-2bbd-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/a/a255a5b0-2bbd-11ef-b37a-07248b6407de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c441144633630595481eca5ed7f59e637e614522
--- /dev/null
+++ b/graph/incidents_graphml/a/a255a5b0-2bbd-11ef-b37a-07248b6407de.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.96
+ 100.64.24.96
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.97
+ 100.64.24.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718527894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a255a5b0-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a255a5b0-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a255a5b0-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a255a5b0-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a255a5b0-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527894
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a255a5b0-2bbd-11ef-b37a-07248b6407de
+
+
+
diff --git a/graph/incidents_graphml/a/a2570df0-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2570df0-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7886547f5ade7340f8446d637836096d64c3605b
--- /dev/null
+++ b/graph/incidents_graphml/a/a2570df0-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.119
+ 100.64.11.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2570df0-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a2589640-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/a/a2589640-a070-11ee-8eba-81c30328b488.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6bdcf09f5f2b6658aa1c8643ae4ebef2115b1ed
--- /dev/null
+++ b/graph/incidents_graphml/a/a2589640-a070-11ee-8eba-81c30328b488.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.245
+ 100.64.5.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.226
+ 100.64.48.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.143
+ 100.64.53.143
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.144
+ 100.64.53.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.145
+ 100.64.53.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211611
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2589640-a070-11ee-8eba-81c30328b488
+
+
+
diff --git a/graph/incidents_graphml/a/a25b35d0-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a25b35d0-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdd72aee7ecda53ad4a3cdc8a22c77861c1ae385
--- /dev/null
+++ b/graph/incidents_graphml/a/a25b35d0-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.149
+ 100.64.23.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a25b35d0-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a2608af0-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a2608af0-47db-11ee-b496-6fe4711b3325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ed986b7c7e653f59eadf14dbfe78861f727b5ba
--- /dev/null
+++ b/graph/incidents_graphml/a/a2608af0-47db-11ee-b496-6fe4711b3325.graphml
@@ -0,0 +1,531 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.3
+ 100.64.52.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.182
+ 100.64.47.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.121
+ 100.64.21.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.5
+ 100.64.17.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.4
+ USER-0015-1395.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.5
+ 100.64.52.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.255
+ 100.64.26.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.68
+ 100.64.32.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.6
+ 100.64.52.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.134
+ 100.64.33.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.7
+ 100.64.52.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.8
+ 100.64.52.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.9
+ 100.64.52.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471914
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2608af0-47db-11ee-b496-6fe4711b3325
+
+
+
diff --git a/graph/incidents_graphml/a/a2666110-9ff0-11ee-b969-fd26b2eb008b.graphml b/graph/incidents_graphml/a/a2666110-9ff0-11ee-b969-fd26b2eb008b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec3a72ad840b111ea0d4afa2117cad2ec7b12b37
--- /dev/null
+++ b/graph/incidents_graphml/a/a2666110-9ff0-11ee-b969-fd26b2eb008b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703156636
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2666110-9ff0-11ee-b969-fd26b2eb008b
+
+
+
diff --git a/graph/incidents_graphml/a/a2669e50-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2669e50-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99a5e56448b369656fe89ae8f01a51be44683cf1
--- /dev/null
+++ b/graph/incidents_graphml/a/a2669e50-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.119
+ 100.64.11.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2669e50-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a26b1450-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a26b1450-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d94d731b596dbcad115d9939447ea6c60d1d222c
--- /dev/null
+++ b/graph/incidents_graphml/a/a26b1450-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.151
+ 100.64.23.151
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452025
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a26b1450-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a27430d0-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a27430d0-089f-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b0e458c21ddd9ba57ac9b41ef6ef26af4bd583c
--- /dev/null
+++ b/graph/incidents_graphml/a/a27430d0-089f-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.71
+ USER-0015-1263.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686519221
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a27430d0-089f-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/a/a2791e10-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a2791e10-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2b42a8de186b1f8f617993757b16c82b6959ec6
--- /dev/null
+++ b/graph/incidents_graphml/a/a2791e10-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.151
+ 100.64.23.151
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452026
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2791e10-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a27e3af0-3a24-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/a/a27e3af0-3a24-11ef-898a-03f77eec545d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f7e5734c4e24c8c0278545cff4c28d01e9701ce
--- /dev/null
+++ b/graph/incidents_graphml/a/a27e3af0-3a24-11ef-898a-03f77eec545d.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.99
+ 100.64.47.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.100
+ 100.64.47.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.101
+ 100.64.47.101
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720111449
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a27e3af0-3a24-11ef-898a-03f77eec545d
+
+
+ INCIDENT_LINK
+ 1720111449
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a27e3af0-3a24-11ef-898a-03f77eec545d
+
+
+ INCIDENT_LINK
+ 1720111449
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a27e3af0-3a24-11ef-898a-03f77eec545d
+
+
+ INCIDENT_LINK
+ 1720111449
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a27e3af0-3a24-11ef-898a-03f77eec545d
+
+
+ INCIDENT_LINK
+ 1720111449
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a27e3af0-3a24-11ef-898a-03f77eec545d
+
+
+ INCIDENT_LINK
+ 1720111449
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a27e3af0-3a24-11ef-898a-03f77eec545d
+
+
+
diff --git a/graph/incidents_graphml/a/a2855310-50c5-11ee-8e23-918003f7627a.graphml b/graph/incidents_graphml/a/a2855310-50c5-11ee-8e23-918003f7627a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35954552b6d50499da29226c8a008f39755c4196
--- /dev/null
+++ b/graph/incidents_graphml/a/a2855310-50c5-11ee-8e23-918003f7627a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.153
+ 100.64.23.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694452026
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2855310-50c5-11ee-8e23-918003f7627a
+
+
+
diff --git a/graph/incidents_graphml/a/a286daa0-ea9b-11ec-95db-b7dc1d72d813.graphml b/graph/incidents_graphml/a/a286daa0-ea9b-11ec-95db-b7dc1d72d813.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93523e9707224a016bec0cbfd47d765559149405
--- /dev/null
+++ b/graph/incidents_graphml/a/a286daa0-ea9b-11ec-95db-b7dc1d72d813.graphml
@@ -0,0 +1,267 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.18
+ USER-0015-1940.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.6
+ 100.64.77.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.211
+ 100.64.72.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ USER-0015-1679.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.220
+ 100.64.71.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.19
+ 100.64.83.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.92
+ USER-0015-1614.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.83.20
+ USER-0015-1941.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+ INCIDENT_LINK
+ 1655071470
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a286daa0-ea9b-11ec-95db-b7dc1d72d813
+
+
+
diff --git a/graph/incidents_graphml/a/a2885790-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a2885790-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77fe05ea9700b2084022fed0c099e63fd659cac5
--- /dev/null
+++ b/graph/incidents_graphml/a/a2885790-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.176
+ 100.64.31.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2885790-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a28a50e0-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a28a50e0-089f-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3398ce270058d57606da76dbd66cf8104c939c17
--- /dev/null
+++ b/graph/incidents_graphml/a/a28a50e0-089f-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.71
+ USER-0015-1263.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686519221
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a28a50e0-089f-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/a/a29533a0-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/a/a29533a0-1ca6-11ee-8a30-871cf58c099a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9993c6a87a04e5ad2217899a088b8d740657473
--- /dev/null
+++ b/graph/incidents_graphml/a/a29533a0-1ca6-11ee-8a30-871cf58c099a.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.65
+ 100.64.48.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.59
+ 100.64.17.59
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.37
+ 100.64.52.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.18
+ USER-0015-1406.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721251
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a29533a0-1ca6-11ee-8a30-871cf58c099a
+
+
+
diff --git a/graph/incidents_graphml/a/a29a58f0-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a29a58f0-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b99b3167074e8a7ead8e8c8494fe448a4d679a9b
--- /dev/null
+++ b/graph/incidents_graphml/a/a29a58f0-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.176
+ 100.64.31.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a29a58f0-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a2aa3770-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a2aa3770-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3baa795233992597d5eade7b4551b9c742d3bc3e
--- /dev/null
+++ b/graph/incidents_graphml/a/a2aa3770-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.89
+ 100.64.37.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2aa3770-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a2b66c70-9003-11ee-97ac-71b8150df801.graphml b/graph/incidents_graphml/a/a2b66c70-9003-11ee-97ac-71b8150df801.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..842c0dae07dc20fd8d2089b5b29e8256c635a6a9
--- /dev/null
+++ b/graph/incidents_graphml/a/a2b66c70-9003-11ee-97ac-71b8150df801.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.177
+ 100.64.16.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701405578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2b66c70-9003-11ee-97ac-71b8150df801
+
+
+ INCIDENT_LINK
+ 1701405578
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2b66c70-9003-11ee-97ac-71b8150df801
+
+
+
diff --git a/graph/incidents_graphml/a/a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f.graphml b/graph/incidents_graphml/a/a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4be4a2db9f20a46de23214ef1316c34c4e7a51d8
--- /dev/null
+++ b/graph/incidents_graphml/a/a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.216
+ 100.64.58.216
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708963862
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c462a0-d4c1-11ee-bf59-a9ad7cebab5f
+
+
+
diff --git a/graph/incidents_graphml/a/a2c5e530-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a2c5e530-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcf78935ac25cf2658e62e8a4467f27095a24c3f
--- /dev/null
+++ b/graph/incidents_graphml/a/a2c5e530-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,441 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.132
+ USER-0015-1713.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.78
+ 100.64.75.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.79
+ 100.64.75.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.80
+ USER-0015-1714.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.81
+ 100.64.75.81
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.82
+ 100.64.75.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.83
+ 100.64.75.83
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.84
+ USER-0015-1715.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.85
+ 100.64.75.85
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.86
+ USER-0015-1716.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.87
+ USER-0015-1717.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.88
+ 100.64.75.88
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.89
+ 100.64.75.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.90
+ 100.64.75.90
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.91
+ USER-0015-1718.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379849
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2c5e530-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a2c6c410-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/a/a2c6c410-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c51e5f9fffe65924fee740111bcf8226a956b12
--- /dev/null
+++ b/graph/incidents_graphml/a/a2c6c410-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.183
+ 100.64.48.183
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.16.175
+ 100.64.16.175
+ ["Exploiting Host"]
+ 0.25
+ ["Meraki","Precinct"]
+
+
+ HOST
+ 100.64.82.126
+ 100.64.82.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.127
+ 100.64.82.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.47.79
+ 100.64.47.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.18.51
+ 100.64.18.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.4.26
+ 100.64.4.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2c6c410-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/a/a2ca9400-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a2ca9400-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3654431c68f0f768fa6a9ae6270e186dbc9cb95
--- /dev/null
+++ b/graph/incidents_graphml/a/a2ca9400-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.180
+ 100.64.35.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150367
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2ca9400-284e-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718150367
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2ca9400-284e-11ef-a876-532faa7c8913
+
+
+ INCIDENT_LINK
+ 1718150367
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2ca9400-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a2cfa010-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a2cfa010-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..267480f2a8ed51120eb61ca8711ced15b2c79c8e
--- /dev/null
+++ b/graph/incidents_graphml/a/a2cfa010-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.218.122
+ 172.26.218.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.204
+ 100.64.88.204
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.20.96.237
+ 172.20.96.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.205
+ 100.64.88.205
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.206
+ 100.64.88.206
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139311
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a2cfa010-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/a/a2d9d280-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2d9d280-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0726f94889aebb637e8c69f5560012501addc60
--- /dev/null
+++ b/graph/incidents_graphml/a/a2d9d280-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.156
+ 100.64.51.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2d9d280-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a2e78b90-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/a/a2e78b90-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf562f84d252e48b9afb52774a9d6cc5554c6fe7
--- /dev/null
+++ b/graph/incidents_graphml/a/a2e78b90-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.198
+ 100.64.72.198
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687192673
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2e78b90-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192673
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2e78b90-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/a/a2eb5eb0-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a2eb5eb0-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e29cba1bd9ab3cda59216fc982cacd164c422e5
--- /dev/null
+++ b/graph/incidents_graphml/a/a2eb5eb0-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.156
+ 100.64.51.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773622
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2eb5eb0-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a2ef5a10-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a2ef5a10-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc0f7b54bfa3dbb2166b9e6a735e43f83216a7ff
--- /dev/null
+++ b/graph/incidents_graphml/a/a2ef5a10-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.182
+ 100.64.35.182
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150367
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2ef5a10-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a2f108e0-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/a/a2f108e0-9daa-11ed-a07d-2388b6eb4361.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26bca13cdd4ac8d55bfabe5f42057b54daf1095a
--- /dev/null
+++ b/graph/incidents_graphml/a/a2f108e0-9daa-11ed-a07d-2388b6eb4361.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.86
+ 100.64.90.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674759172
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2f108e0-9daa-11ed-a07d-2388b6eb4361
+
+
+
diff --git a/graph/incidents_graphml/a/a2f53440-d6a5-11ed-836d-79bb3a962e0f.graphml b/graph/incidents_graphml/a/a2f53440-d6a5-11ed-836d-79bb3a962e0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f48ebd5988c60bc94644a18d1336602490f95235
--- /dev/null
+++ b/graph/incidents_graphml/a/a2f53440-d6a5-11ed-836d-79bb3a962e0f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.201
+ 100.64.23.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681024241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2f53440-d6a5-11ed-836d-79bb3a962e0f
+
+
+
diff --git a/graph/incidents_graphml/a/a2f847d0-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a2f847d0-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcfb383de76030f8bf56875b10d0cf195c38ffee
--- /dev/null
+++ b/graph/incidents_graphml/a/a2f847d0-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.28
+ 100.64.55.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170775
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2f847d0-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/a/a2f92ea0-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a2f92ea0-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..118fcb010199d680afeafe1d47c26d8ad3b2c6b4
--- /dev/null
+++ b/graph/incidents_graphml/a/a2f92ea0-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.197
+ 100.64.22.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668292
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a2f92ea0-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a2fa1490-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a2fa1490-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64cdc9b6609e1df9c67653e37b05ad585eb9ae21
--- /dev/null
+++ b/graph/incidents_graphml/a/a2fa1490-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.157
+ 100.64.75.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.73
+ USER-0015-1646.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2fa1490-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a2fa1490-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a2fcff80-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/a/a2fcff80-26aa-11ef-8ab8-f12e3827fb22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7b746922a9a4696b8b212e222959c0a1b5c136e
--- /dev/null
+++ b/graph/incidents_graphml/a/a2fcff80-26aa-11ef-8ab8-f12e3827fb22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.24
+ 100.64.45.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717969979
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a2fcff80-26aa-11ef-8ab8-f12e3827fb22
+
+
+
diff --git a/graph/incidents_graphml/a/a3014330-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a3014330-72da-11ee-8d2c-297df9484f05.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36008191332bb27e18f2d54c2168fa10bf16239d
--- /dev/null
+++ b/graph/incidents_graphml/a/a3014330-72da-11ee-8d2c-297df9484f05.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698199385
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3014330-72da-11ee-8d2c-297df9484f05
+
+
+
diff --git a/graph/incidents_graphml/a/a307ff40-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/a/a307ff40-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..763b6a90dbe64bfdffada585ae2f2a9c0af48db4
--- /dev/null
+++ b/graph/incidents_graphml/a/a307ff40-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.28
+ 100.64.55.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170775
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a307ff40-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/a/a30bf3a0-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/a/a30bf3a0-26aa-11ef-8ab8-f12e3827fb22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eac92fef3a9ad1900ac9db0b3bb859e9a55f64ed
--- /dev/null
+++ b/graph/incidents_graphml/a/a30bf3a0-26aa-11ef-8ab8-f12e3827fb22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.24
+ 100.64.45.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717969979
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a30bf3a0-26aa-11ef-8ab8-f12e3827fb22
+
+
+
diff --git a/graph/incidents_graphml/a/a30c3bd0-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/a/a30c3bd0-2d7b-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e2f8e35dcb6611e7530b8f7d0aad914805aa89d
--- /dev/null
+++ b/graph/incidents_graphml/a/a30c3bd0-2d7b-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.186.190
+ 172.31.186.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.190
+ 100.64.93.190
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.34
+ 100.64.89.34
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.191
+ 100.64.93.191
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718719451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a30c3bd0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a30c3bd0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a30c3bd0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a30c3bd0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a30c3bd0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a30c3bd0-2d7b-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/a/a30f4a40-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a30f4a40-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d33fdd418be50cd6c604a9d731e2da970a676b9
--- /dev/null
+++ b/graph/incidents_graphml/a/a30f4a40-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.158
+ 100.64.75.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.190
+ 100.64.72.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379850
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a30f4a40-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379850
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a30f4a40-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a3110670-2bbd-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/a/a3110670-2bbd-11ef-b37a-07248b6407de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76a9e8e7432d6648de985c91998f7dc2e220e2f4
--- /dev/null
+++ b/graph/incidents_graphml/a/a3110670-2bbd-11ef-b37a-07248b6407de.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.100
+ 100.64.24.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718527895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3110670-2bbd-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3110670-2bbd-11ef-b37a-07248b6407de
+
+
+
diff --git a/graph/incidents_graphml/a/a3187300-9ff0-11ee-b969-fd26b2eb008b.graphml b/graph/incidents_graphml/a/a3187300-9ff0-11ee-b969-fd26b2eb008b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ab6841b7cd40f6e5dc42e7d5b327711264e52a2
--- /dev/null
+++ b/graph/incidents_graphml/a/a3187300-9ff0-11ee-b969-fd26b2eb008b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.10
+ 100.64.8.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703156637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3187300-9ff0-11ee-b969-fd26b2eb008b
+
+
+
diff --git a/graph/incidents_graphml/a/a31bd220-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/a/a31bd220-26aa-11ef-8ab8-f12e3827fb22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8ac554399c1f221eed08a9f3b2d1e3cdf630669
--- /dev/null
+++ b/graph/incidents_graphml/a/a31bd220-26aa-11ef-8ab8-f12e3827fb22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.25
+ 100.64.45.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717969979
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a31bd220-26aa-11ef-8ab8-f12e3827fb22
+
+
+
diff --git a/graph/incidents_graphml/a/a321b4b0-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a321b4b0-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2014d632bf739d3d18215a58201d31e585c994ca
--- /dev/null
+++ b/graph/incidents_graphml/a/a321b4b0-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.184
+ 100.64.35.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150368
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a321b4b0-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a32571f0-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a32571f0-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbad1d7492dc31144cc349e17070e1fc3b059bc9
--- /dev/null
+++ b/graph/incidents_graphml/a/a32571f0-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.110
+ 100.64.14.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685375043
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a32571f0-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a330f6f0-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a330f6f0-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3548df15d83412686d0be2d7af0af296acaf529c
--- /dev/null
+++ b/graph/incidents_graphml/a/a330f6f0-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.184
+ 100.64.35.184
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150368
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a330f6f0-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a3310f90-6d65-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/a3310f90-6d65-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a91b5246f355ccb9148ed5c988db65b9b9973ea
--- /dev/null
+++ b/graph/incidents_graphml/a/a3310f90-6d65-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.206
+ 100.64.54.206
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697599379
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3310f90-6d65-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/a/a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/a/a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6361368eae904286215d6e6e68a1f53be220243
--- /dev/null
+++ b/graph/incidents_graphml/a/a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.153
+ 100.64.7.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695978458
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a33430c0-5ea7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/a/a3355210-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a3355210-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6632a46f8e996de0531a2771e5d873457b23e752
--- /dev/null
+++ b/graph/incidents_graphml/a/a3355210-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.111
+ 100.64.10.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3355210-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a33772d0-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a33772d0-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d385a9b5f37159268b3fda5adaa8aca084f9dd2
--- /dev/null
+++ b/graph/incidents_graphml/a/a33772d0-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.194
+ 100.64.24.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638428
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a33772d0-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a339bd40-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a339bd40-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..414e7b142ebcb7af4c8611255a64ddfd2b9a0f11
--- /dev/null
+++ b/graph/incidents_graphml/a/a339bd40-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.217
+ 100.64.49.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685375043
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a339bd40-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a33be2b0-ed79-11ed-a662-a9c0e7c292a4.graphml b/graph/incidents_graphml/a/a33be2b0-ed79-11ed-a662-a9c0e7c292a4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b01a870217f6f57b53300fd470d0636e0c08a3d7
--- /dev/null
+++ b/graph/incidents_graphml/a/a33be2b0-ed79-11ed-a662-a9c0e7c292a4.graphml
@@ -0,0 +1,817 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.105
+ 100.64.39.105
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.62.175
+ 100.64.62.175
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.192
+ 100.64.68.192
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.193
+ 100.64.68.193
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.129
+ 100.64.68.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Ransomware Target","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.68.194
+ 100.64.68.194
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.28.243
+ 100.64.28.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.195
+ 100.64.68.195
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+ INCIDENT_LINK
+ 1683534220
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Target"]
+ complete-mission
+ Disrupted
+ a33be2b0-ed79-11ed-a662-a9c0e7c292a4
+
+
+
diff --git a/graph/incidents_graphml/a/a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c10ddaff35b693b63dad7527c75d2ef63de7b9c8
--- /dev/null
+++ b/graph/incidents_graphml/a/a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.170
+ 100.64.38.170
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a33bf6a0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a34003b0-6d65-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/a34003b0-6d65-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2d51df3825ffde3915c898f676f9dc51bea9423
--- /dev/null
+++ b/graph/incidents_graphml/a/a34003b0-6d65-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.206
+ 100.64.54.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697599379
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a34003b0-6d65-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/a/a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/a/a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c624b714494848b2658ea5dcb668cee716b2b38
--- /dev/null
+++ b/graph/incidents_graphml/a/a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.153
+ 100.64.7.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695978458
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a341c550-5ea7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/a/a353fc00-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a353fc00-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3222aab637fb49361e4f38178835f8ae3fef1ce5
--- /dev/null
+++ b/graph/incidents_graphml/a/a353fc00-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.49.217
+ 100.64.49.217
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685375043
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a353fc00-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a3563300-0861-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/a/a3563300-0861-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9351961d46b874a0d6a4457c174d9dd1f148e534
--- /dev/null
+++ b/graph/incidents_graphml/a/a3563300-0861-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.248
+ 100.64.14.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.249
+ 100.64.14.249
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.95
+ 100.64.9.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.14.250
+ 100.64.14.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.251
+ 100.64.14.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.252
+ 100.64.14.252
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.253
+ 100.64.14.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.254
+ 100.64.14.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.14.255
+ 100.64.14.255
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.2
+ 100.64.15.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.3
+ 100.64.15.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.55
+ 100.64.13.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.168
+ 100.64.6.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.4
+ 100.64.15.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.5
+ 100.64.15.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.130
+ 100.64.9.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714640091
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3563300-0861-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/a/a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3a45d011505f1ee13dbc90fe6b14bad94a0b8ed
--- /dev/null
+++ b/graph/incidents_graphml/a/a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a35c76f0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a35e2170-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a35e2170-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..693eb2c40d4774350d0dbd234a5b2d2400a0bb4c
--- /dev/null
+++ b/graph/incidents_graphml/a/a35e2170-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.238
+ 100.64.21.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150368
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a35e2170-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a35f2f20-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a35f2f20-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1063d86bd23095f7fe0358959f90b95c6c8da450
--- /dev/null
+++ b/graph/incidents_graphml/a/a35f2f20-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.158
+ 100.64.51.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a35f2f20-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a3686e60-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3686e60-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e37a9ee34620c46b1c1916c56edf3d3711b45e2
--- /dev/null
+++ b/graph/incidents_graphml/a/a3686e60-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.219
+ 100.64.49.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685375043
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3686e60-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a368e530-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a368e530-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ec944656b5109e26b50a9c297f9acff0247ed0c
--- /dev/null
+++ b/graph/incidents_graphml/a/a368e530-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.111
+ 100.64.10.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823473
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a368e530-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f8884f367438f27544178d3239cce704567b2be
--- /dev/null
+++ b/graph/incidents_graphml/a/a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a36c2e60-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a36ff800-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a36ff800-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..821fad03ac96aac1b5d5235826f5848828cd38e8
--- /dev/null
+++ b/graph/incidents_graphml/a/a36ff800-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.158
+ 100.64.51.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a36ff800-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a3702800-fe09-11ec-9816-ad54cdda58f5.graphml b/graph/incidents_graphml/a/a3702800-fe09-11ec-9816-ad54cdda58f5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9c2f6dc5a50f611ea36a9d1ebb13b020f9ebe34
--- /dev/null
+++ b/graph/incidents_graphml/a/a3702800-fe09-11ec-9816-ad54cdda58f5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.59
+ 100.64.72.59
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.240
+ USER-0015-1630.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657207789
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3702800-fe09-11ec-9816-ad54cdda58f5
+
+
+
diff --git a/graph/incidents_graphml/a/a3735720-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a3735720-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b8cf993e4cc65339431756907d6c19157597849
--- /dev/null
+++ b/graph/incidents_graphml/a/a3735720-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.238
+ 100.64.21.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150368
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3735720-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a377a010-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a377a010-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab308c125b874df23768226476d5c6d3457fd00c
--- /dev/null
+++ b/graph/incidents_graphml/a/a377a010-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.172
+ 100.64.38.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a377a010-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a377a010-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3784470-9b49-11ee-8c6f-ef195d8f48bb.graphml b/graph/incidents_graphml/a/a3784470-9b49-11ee-8c6f-ef195d8f48bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4158013252020a687402a1fe70813a8bb51bc86e
--- /dev/null
+++ b/graph/incidents_graphml/a/a3784470-9b49-11ee-8c6f-ef195d8f48bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.1
+ 100.64.17.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702645107
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3784470-9b49-11ee-8c6f-ef195d8f48bb
+
+
+
diff --git a/graph/incidents_graphml/a/a37c0cb0-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a37c0cb0-25bc-11ef-8084-11f20777a6f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4932c54fe3b18eaec72eeec56a7e61e24b305f28
--- /dev/null
+++ b/graph/incidents_graphml/a/a37c0cb0-25bc-11ef-8084-11f20777a6f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.76
+ 100.64.16.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717867759
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a37c0cb0-25bc-11ef-8084-11f20777a6f9
+
+
+
diff --git a/graph/incidents_graphml/a/a37ddab0-7813-11ee-a719-91c3184b15ab.graphml b/graph/incidents_graphml/a/a37ddab0-7813-11ee-a719-91c3184b15ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b21968f4d85f937d1469176b0c43185d67aaa6b8
--- /dev/null
+++ b/graph/incidents_graphml/a/a37ddab0-7813-11ee-a719-91c3184b15ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.160
+ 100.64.51.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698773623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a37ddab0-7813-11ee-a719-91c3184b15ab
+
+
+
diff --git a/graph/incidents_graphml/a/a381e430-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/a/a381e430-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46b03baf0245290ae8c8108b7bddfb65af840e99
--- /dev/null
+++ b/graph/incidents_graphml/a/a381e430-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.174
+ 100.64.79.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370402
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a381e430-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370402
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a381e430-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/a/a3825520-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3825520-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0260bdf2f36473a076d8f4876a14ede02f477a8e
--- /dev/null
+++ b/graph/incidents_graphml/a/a3825520-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.253
+ 100.64.43.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3825520-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a3825f00-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3825f00-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40974153bdbeb714518126f55d98935035011008
--- /dev/null
+++ b/graph/incidents_graphml/a/a3825f00-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.49.219
+ 100.64.49.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685375044
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3825f00-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a383ae00-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a383ae00-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6c5fd78ae2032d1c390da696080d2ed4b6f8f40
--- /dev/null
+++ b/graph/incidents_graphml/a/a383ae00-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.172
+ 100.64.38.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a383ae00-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3842000-284e-11ef-a876-532faa7c8913.graphml b/graph/incidents_graphml/a/a3842000-284e-11ef-a876-532faa7c8913.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e009781901508dcd723f6072f06b1e0e346860d
--- /dev/null
+++ b/graph/incidents_graphml/a/a3842000-284e-11ef-a876-532faa7c8913.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.161
+ 100.64.14.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718150368
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3842000-284e-11ef-a876-532faa7c8913
+
+
+
diff --git a/graph/incidents_graphml/a/a388e640-9b49-11ee-8c6f-ef195d8f48bb.graphml b/graph/incidents_graphml/a/a388e640-9b49-11ee-8c6f-ef195d8f48bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3eadca79870b168351a7f0455d565b668602da10
--- /dev/null
+++ b/graph/incidents_graphml/a/a388e640-9b49-11ee-8c6f-ef195d8f48bb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.1
+ 100.64.17.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702645107
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a388e640-9b49-11ee-8c6f-ef195d8f48bb
+
+
+
diff --git a/graph/incidents_graphml/a/a38d23b0-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a38d23b0-25bc-11ef-8084-11f20777a6f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..556fc839bdbc2b949ad928292f754d8ecc2cec4c
--- /dev/null
+++ b/graph/incidents_graphml/a/a38d23b0-25bc-11ef-8084-11f20777a6f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.76
+ 100.64.16.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717867760
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a38d23b0-25bc-11ef-8084-11f20777a6f9
+
+
+
diff --git a/graph/incidents_graphml/a/a38e9bb0-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/a/a38e9bb0-a2d5-11ee-8541-6f03abc6c851.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c119f723794ccf29b32ae7830956987b3b331ad
--- /dev/null
+++ b/graph/incidents_graphml/a/a38e9bb0-a2d5-11ee-8541-6f03abc6c851.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.150
+ 100.64.29.150
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.177
+ 100.64.25.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.214
+ 100.64.13.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.151
+ 100.64.29.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.152
+ 100.64.29.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.153
+ 100.64.29.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.154
+ 100.64.29.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.9
+ 100.64.22.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.186
+ 100.64.8.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.155
+ 100.64.29.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.156
+ 100.64.29.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.7
+ 100.64.25.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.157
+ 100.64.29.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.158
+ 100.64.29.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.159
+ 100.64.29.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.160
+ 100.64.29.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a38e9bb0-a2d5-11ee-8541-6f03abc6c851
+
+
+
diff --git a/graph/incidents_graphml/a/a38f8000-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a38f8000-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49abfb517e7baa2b1f48ff054c7306e977081722
--- /dev/null
+++ b/graph/incidents_graphml/a/a38f8000-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.178
+ 100.64.35.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823473
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a38f8000-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a3984e20-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3984e20-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e7c9d0580a22c3921db10b0a9367fceffc47de0
--- /dev/null
+++ b/graph/incidents_graphml/a/a3984e20-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.253
+ 100.64.43.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3984e20-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a39c0930-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/a/a39c0930-a2d5-11ee-8541-6f03abc6c851.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e188ab9ce9715264a29e76f7df66933ab86f36b8
--- /dev/null
+++ b/graph/incidents_graphml/a/a39c0930-a2d5-11ee-8541-6f03abc6c851.graphml
@@ -0,0 +1,481 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.172
+ 100.64.29.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.173
+ 100.64.29.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.174
+ USER-0015-1281.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.175
+ 100.64.29.175
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.176
+ 100.64.29.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.177
+ 100.64.29.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.154
+ 100.64.29.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.178
+ 100.64.29.178
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.179
+ 100.64.29.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.180
+ 100.64.29.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.21
+ 100.64.25.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.181
+ 100.64.29.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a39c0930-a2d5-11ee-8541-6f03abc6c851
+
+
+
diff --git a/graph/incidents_graphml/a/a39d7790-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a39d7790-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b2997691354d1ec07a08d30cf0213c506bf0a1b
--- /dev/null
+++ b/graph/incidents_graphml/a/a39d7790-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.150
+ 100.64.10.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a39d7790-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3a4b410-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3a4b410-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9513037ce7998a14fc0266569b1af5ace4e857ec
--- /dev/null
+++ b/graph/incidents_graphml/a/a3a4b410-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685375044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a3a4b410-fe37-11ed-9c9c-8569f16cc2dc
+
+
+ INCIDENT_LINK
+ 1685375044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a3a4b410-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a3a87ac0-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3a87ac0-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f36be821cde4dfd540186e85f6d984a7710d132
--- /dev/null
+++ b/graph/incidents_graphml/a/a3a87ac0-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.255
+ 100.64.43.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3a87ac0-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a3ae9780-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a3ae9780-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..882de0dc8f803df02b8c989b70f5bb914cac9680
--- /dev/null
+++ b/graph/incidents_graphml/a/a3ae9780-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.149
+ 100.64.71.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3ae9780-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3ae9780-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1b98dd3749d9f7840c245f2242235ec31a560ec
--- /dev/null
+++ b/graph/incidents_graphml/a/a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.54
+ 100.64.9.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299196
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3b3a2b0-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a3b41f00-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a3b41f00-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aeadda8624f44fc7b8daded772cbbeec2347269a
--- /dev/null
+++ b/graph/incidents_graphml/a/a3b41f00-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.178
+ 100.64.35.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823473
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3b41f00-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a3ba7c20-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a3ba7c20-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae4c3c4f97806b2d044699f1dbe9973aab527ed4
--- /dev/null
+++ b/graph/incidents_graphml/a/a3ba7c20-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.255
+ 100.64.43.255
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3ba7c20-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a3bc0500-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a3bc0500-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e87c151f119ff47809bb9afecd49519168c0b35b
--- /dev/null
+++ b/graph/incidents_graphml/a/a3bc0500-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.159
+ 100.64.75.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3bc0500-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3bc0500-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3618b9d78f5d9c3268e85aac5ef4c101404b9b4
--- /dev/null
+++ b/graph/incidents_graphml/a/a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.169
+ 100.64.39.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821139
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3bcc160-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6875b568575af260ca53150480c50617c4b8bbd
--- /dev/null
+++ b/graph/incidents_graphml/a/a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.174
+ 100.64.38.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3bd82b0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3be0540-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a3be0540-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a88fd01e10c407b832a140258e9f41f53b97b9a
--- /dev/null
+++ b/graph/incidents_graphml/a/a3be0540-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.10
+ 100.64.66.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668293
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3be0540-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668293
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3be0540-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a3c05260-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3c05260-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4f0c91d281980b254529ada1ee998967a2a53e0
--- /dev/null
+++ b/graph/incidents_graphml/a/a3c05260-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685375044
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3c05260-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..173cefae89eb19a550a01e1e66cc4d7e0823bec0
--- /dev/null
+++ b/graph/incidents_graphml/a/a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.174
+ 100.64.38.174
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951539
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3cc4fc0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3d04960-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a3d04960-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae2350242cea5c97bb1788952179ec28f2d7defa
--- /dev/null
+++ b/graph/incidents_graphml/a/a3d04960-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.169
+ 100.64.39.169
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821139
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3d04960-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a3d89d00-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/a/a3d89d00-a2d5-11ee-8541-6f03abc6c851.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2284c41a368b78d7d5e2881d5019d0d6cfb6bff3
--- /dev/null
+++ b/graph/incidents_graphml/a/a3d89d00-a2d5-11ee-8541-6f03abc6c851.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.63
+ 100.64.23.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.192
+ 100.64.29.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.5
+ 100.64.17.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.193
+ 100.64.29.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.194
+ 100.64.29.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.195
+ 100.64.29.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.196
+ USER-0015-1282.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.197
+ USER-0015-1283.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474895
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3d89d00-a2d5-11ee-8541-6f03abc6c851
+
+
+
diff --git a/graph/incidents_graphml/a/a3ddc240-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a3ddc240-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca6e7600e49cca17371095bb39cfa479fda7dcf8
--- /dev/null
+++ b/graph/incidents_graphml/a/a3ddc240-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.10
+ 100.64.66.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668293
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3ddc240-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecf21a9d4496f98a32dfe6a166aa2e447af0ed28
--- /dev/null
+++ b/graph/incidents_graphml/a/a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ec33d0-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e5e69b6b0b68a2533d9826317eba502135f2faf
--- /dev/null
+++ b/graph/incidents_graphml/a/a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.233
+ 100.64.73.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.39
+ USER-0015-1719.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379851
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a3ee5fa0-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a3f0d840-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a3f0d840-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8577b067171431192afa0738589920c2ffaed64
--- /dev/null
+++ b/graph/incidents_graphml/a/a3f0d840-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.30.88
+ 100.64.30.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685375044
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3f0d840-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/a/a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e5b2739e512aec6b161665ab4764198828fd07c
--- /dev/null
+++ b/graph/incidents_graphml/a/a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.161
+ 100.64.82.161
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.162
+ 100.64.82.162
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688783101
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783101
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783101
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783101
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a3f388b0-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+
diff --git a/graph/incidents_graphml/a/a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7.graphml b/graph/incidents_graphml/a/a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b2619691b7d2b84b6de5ba6490a5984b1cc560f
--- /dev/null
+++ b/graph/incidents_graphml/a/a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1707951540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3f9c860-cb8c-11ee-9d8c-014a3c92d0a7
+
+
+
diff --git a/graph/incidents_graphml/a/a3ffc160-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a3ffc160-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bd52fec9205dfc87712dcef62931fc26c1bb444
--- /dev/null
+++ b/graph/incidents_graphml/a/a3ffc160-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.155
+ 100.64.44.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002123
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a3ffc160-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a406f520-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a406f520-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe4e0bcf7f727e8cad27bdb9a6808f988fcfc8cc
--- /dev/null
+++ b/graph/incidents_graphml/a/a406f520-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.12
+ USER-0015-1469.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668294
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a406f520-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a41656a0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a41656a0-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc5efdb02595976a986b194d1e912f09bd53fd60
--- /dev/null
+++ b/graph/incidents_graphml/a/a41656a0-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.87
+ 100.64.60.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a41656a0-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a425c4f0-6503-11ee-b447-a9f06618d419.graphml b/graph/incidents_graphml/a/a425c4f0-6503-11ee-b447-a9f06618d419.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6175baff9eb3e4fd940e42317ace7bfc261c566
--- /dev/null
+++ b/graph/incidents_graphml/a/a425c4f0-6503-11ee-b447-a9f06618d419.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.247
+ 100.64.89.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696677680
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a425c4f0-6503-11ee-b447-a9f06618d419
+
+
+
diff --git a/graph/incidents_graphml/a/a426fbd0-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a426fbd0-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5823aee8a18030b11b3b5ef221fe88f61accf6cb
--- /dev/null
+++ b/graph/incidents_graphml/a/a426fbd0-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.160
+ 100.64.75.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a426fbd0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a426fbd0-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a4271f80-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4271f80-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69fc068997c97930377629f564a9a8b0a11c8fb7
--- /dev/null
+++ b/graph/incidents_graphml/a/a4271f80-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.89
+ 100.64.60.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a4271f80-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a42e5340-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a42e5340-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92fb5638ba5ba4e47abeb71f4296bee5503a92e9
--- /dev/null
+++ b/graph/incidents_graphml/a/a42e5340-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.12
+ USER-0015-1469.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668294
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a42e5340-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a42fc220-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a42fc220-27c4-11ed-b92c-490402bdd5e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34962cac761533069b67799d5c0680e3100c8783
--- /dev/null
+++ b/graph/incidents_graphml/a/a42fc220-27c4-11ed-b92c-490402bdd5e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.185
+ 100.64.80.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661796104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a42fc220-27c4-11ed-b92c-490402bdd5e6
+
+
+
diff --git a/graph/incidents_graphml/a/a431d8e0-fe37-11ed-9c9c-8569f16cc2dc.graphml b/graph/incidents_graphml/a/a431d8e0-fe37-11ed-9c9c-8569f16cc2dc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfe8fce1ad0eef7907a6a5ff4d80903a3a155a92
--- /dev/null
+++ b/graph/incidents_graphml/a/a431d8e0-fe37-11ed-9c9c-8569f16cc2dc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.221
+ 100.64.49.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685375045
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a431d8e0-fe37-11ed-9c9c-8569f16cc2dc
+
+
+
diff --git a/graph/incidents_graphml/a/a433f0c0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a433f0c0-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db93dee89cd9d141b5cb1bbc67cb80c8f25d560b
--- /dev/null
+++ b/graph/incidents_graphml/a/a433f0c0-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.93
+ 100.64.60.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a433f0c0-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a434de80-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a434de80-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ca08065fedb5a1d750cdbe944d2edea0708e234
--- /dev/null
+++ b/graph/incidents_graphml/a/a434de80-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.102
+ USER-0015-1720.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ USER-0015-1612.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.161
+ 100.64.75.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a434de80-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a434de80-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a434de80-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a434de80-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a434de80-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a434de80-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a438c2d0-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a438c2d0-27c4-11ed-b92c-490402bdd5e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..524e6630f3634e54e781b01bbe20a1bfb94cdb71
--- /dev/null
+++ b/graph/incidents_graphml/a/a438c2d0-27c4-11ed-b92c-490402bdd5e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.186
+ 100.64.80.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.214
+ 100.64.72.214
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661796104
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a438c2d0-27c4-11ed-b92c-490402bdd5e6
+
+
+
diff --git a/graph/incidents_graphml/a/a4435a10-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4435a10-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72e39019b94bbf739daf7eb0102979faec36811d
--- /dev/null
+++ b/graph/incidents_graphml/a/a4435a10-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.93
+ 100.64.60.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a4435a10-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a44946b0-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a44946b0-6071-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9d497a2f81e9208debf4a33d308d0fc4aa9836d
--- /dev/null
+++ b/graph/incidents_graphml/a/a44946b0-6071-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.79
+ 100.64.77.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ 100.64.1.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668027672
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a44946b0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027672
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a44946b0-6071-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a44eac80-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a44eac80-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d292946e525b6790e22b0aeac209700cd350e057
--- /dev/null
+++ b/graph/incidents_graphml/a/a44eac80-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.14
+ 100.64.66.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668294
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a44eac80-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a45386b0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a45386b0-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00906eb2aa24a1e5528fa815bcfc6e952c20f722
--- /dev/null
+++ b/graph/incidents_graphml/a/a45386b0-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.189
+ 100.64.27.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002124
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a45386b0-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a45e9300-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/a/a45e9300-22d3-11ef-b7cc-27d8681b231b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a406b85b34c6716620f96334ff646fba1b432037
--- /dev/null
+++ b/graph/incidents_graphml/a/a45e9300-22d3-11ef-b7cc-27d8681b231b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.89.241
+ 100.64.89.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1717547786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a45e9300-22d3-11ef-b7cc-27d8681b231b
+
+
+
diff --git a/graph/incidents_graphml/a/a45f7c10-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a45f7c10-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..106564125c14fb3703c047001008ab5eda62c0ef
--- /dev/null
+++ b/graph/incidents_graphml/a/a45f7c10-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.233
+ 100.64.90.233
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a45f7c10-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a4600fe0-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a4600fe0-72da-11ee-8d2c-297df9484f05.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..079a5808d8f4a086ff3c1fb10a2dba985341a356
--- /dev/null
+++ b/graph/incidents_graphml/a/a4600fe0-72da-11ee-8d2c-297df9484f05.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.81
+ 100.64.60.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698199388
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4600fe0-72da-11ee-8d2c-297df9484f05
+
+
+ INCIDENT_LINK
+ 1698199388
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4600fe0-72da-11ee-8d2c-297df9484f05
+
+
+
diff --git a/graph/incidents_graphml/a/a461ed10-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a461ed10-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d0e49d8de6dd2409a0479ac6a96d0396255f4cd
--- /dev/null
+++ b/graph/incidents_graphml/a/a461ed10-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.157
+ 100.64.71.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a461ed10-3235-11ed-88fd-4f3fdda20925
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a461ed10-3235-11ed-88fd-4f3fdda20925
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a461ed10-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a46632d0-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a46632d0-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a9fb83f458bb05a3c84884146dd8963ecf42fd0
--- /dev/null
+++ b/graph/incidents_graphml/a/a46632d0-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.71.157
+ 100.64.71.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a46632d0-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a46764a0-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a46764a0-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdff38959eee8eb91a7a3426e936d22672bdeb44
--- /dev/null
+++ b/graph/incidents_graphml/a/a46764a0-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.14
+ 100.64.66.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668294
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a46764a0-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a4684730-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4684730-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eda7d04640034dc09af4fc7b93254decf5e37a15
--- /dev/null
+++ b/graph/incidents_graphml/a/a4684730-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.189
+ 100.64.27.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002124
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4684730-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a469dc50-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a469dc50-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f30f7445737e0145f0d521f189e9968424a2191
--- /dev/null
+++ b/graph/incidents_graphml/a/a469dc50-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.248
+ 100.64.90.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a469dc50-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a46da1c0-ed69-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/a/a46da1c0-ed69-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4799f9970abb45ab90df864bdc481d3fa794bb02
--- /dev/null
+++ b/graph/incidents_graphml/a/a46da1c0-ed69-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.170
+ USER-0015-1679.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.162
+ 100.64.75.162
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.163
+ 100.64.75.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a46da1c0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a46da1c0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a46da1c0-ed69-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655379852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a46da1c0-ed69-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/a/a46e2210-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a46e2210-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10b413ffeeff2b344c738d0738fdcf3baeb4eea9
--- /dev/null
+++ b/graph/incidents_graphml/a/a46e2210-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.248
+ 100.64.90.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a46e2210-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a473efc0-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/a/a473efc0-22d3-11ef-b7cc-27d8681b231b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8d6bab0a4ef07a96c1e2ef668e19d3339139c76
--- /dev/null
+++ b/graph/incidents_graphml/a/a473efc0-22d3-11ef-b7cc-27d8681b231b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 10.207.79.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.241
+ 100.64.89.241
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717547786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a473efc0-22d3-11ef-b7cc-27d8681b231b
+
+
+
diff --git a/graph/incidents_graphml/a/a4748ab0-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a4748ab0-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70eef393fb3b9ba20028580fa063bb9da2c66efd
--- /dev/null
+++ b/graph/incidents_graphml/a/a4748ab0-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.196
+ 100.64.19.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4748ab0-3235-11ed-88fd-4f3fdda20925
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4748ab0-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a475eb30-1172-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/a/a475eb30-1172-11ef-98dd-db867c05f09b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b45a5f90e7c995b0642280c6905ef24e2f1e7380
--- /dev/null
+++ b/graph/incidents_graphml/a/a475eb30-1172-11ef-98dd-db867c05f09b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.82
+ 172.25.216.82
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall","ManageEngine ADManager","Cisco Network Operating System","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.120
+ 100.64.90.120
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.13
+ 100.64.87.13
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.90.118
+ 100.64.90.118
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715636955
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a475eb30-1172-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715636955
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a475eb30-1172-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715636955
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a475eb30-1172-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715636955
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a475eb30-1172-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715636955
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a475eb30-1172-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715636955
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a475eb30-1172-11ef-98dd-db867c05f09b
+
+
+
diff --git a/graph/incidents_graphml/a/a478e020-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a478e020-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92cb2b2f482b7101d09f4cbe3b7f7679219df9df
--- /dev/null
+++ b/graph/incidents_graphml/a/a478e020-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.156
+ 100.64.35.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a478e020-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a4791e90-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a4791e90-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b06e1d734f7b725e287fb82816398855d64cfd4
--- /dev/null
+++ b/graph/incidents_graphml/a/a4791e90-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.19.196
+ 100.64.19.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a4791e90-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a4797f80-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a4797f80-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63a545a855873c95ae3c0924c6919c94cf2a37f0
--- /dev/null
+++ b/graph/incidents_graphml/a/a4797f80-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.207
+ 100.64.88.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4797f80-bc68-11ed-b487-1b4dcbdf8241
+
+
+ INCIDENT_LINK
+ 1678139314
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4797f80-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/a/a47a75b0-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a47a75b0-72da-11ee-8d2c-297df9484f05.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d456343a9790adf745ab1416772e48665a18ef50
--- /dev/null
+++ b/graph/incidents_graphml/a/a47a75b0-72da-11ee-8d2c-297df9484f05.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.81
+ 100.64.60.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698199388
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a47a75b0-72da-11ee-8d2c-297df9484f05
+
+
+
diff --git a/graph/incidents_graphml/a/a47f1200-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a47f1200-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0b696cfd7656d6c2905f8bd6e92d05162166227
--- /dev/null
+++ b/graph/incidents_graphml/a/a47f1200-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.19.196
+ 100.64.19.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a47f1200-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a481aa10-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a481aa10-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8022ad807c33dbb7fd1ad7d3886f2f123a8f75c
--- /dev/null
+++ b/graph/incidents_graphml/a/a481aa10-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a481aa10-3235-11ed-88fd-4f3fdda20925
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a481aa10-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a482a900-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/a/a482a900-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..369682fa3c3450578eebe49532a5b3fec44e719d
--- /dev/null
+++ b/graph/incidents_graphml/a/a482a900-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.248
+ 100.64.52.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a482a900-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/a/a4863df0-3235-11ed-88fd-4f3fdda20925.graphml b/graph/incidents_graphml/a/a4863df0-3235-11ed-88fd-4f3fdda20925.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e81e5820abeb5814da7b7253aadc65f7b1e3624
--- /dev/null
+++ b/graph/incidents_graphml/a/a4863df0-3235-11ed-88fd-4f3fdda20925.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662944149
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4863df0-3235-11ed-88fd-4f3fdda20925
+
+
+
diff --git a/graph/incidents_graphml/a/a48b2fa0-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a48b2fa0-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1c347a359b3d7d219c10168bfcff47833430770
--- /dev/null
+++ b/graph/incidents_graphml/a/a48b2fa0-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.156
+ 100.64.35.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548929
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a48b2fa0-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a48f9f90-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a48f9f90-25bc-11ef-8084-11f20777a6f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd0d45d8f33e33b02b4363662e0fe96e3601bfba
--- /dev/null
+++ b/graph/incidents_graphml/a/a48f9f90-25bc-11ef-8084-11f20777a6f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.78
+ 100.64.16.78
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717867761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a48f9f90-25bc-11ef-8084-11f20777a6f9
+
+
+
diff --git a/graph/incidents_graphml/a/a491e090-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/a/a491e090-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69f23419944f477da907acdcec40805a27cf3921
--- /dev/null
+++ b/graph/incidents_graphml/a/a491e090-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773036
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a491e090-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/a/a497df20-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a497df20-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f7e611bbf6ef9dfb89258bcb92d993f9db06f83
--- /dev/null
+++ b/graph/incidents_graphml/a/a497df20-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.171
+ 100.64.39.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821140
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a497df20-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a4a217e0-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/a/a4a217e0-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..563438c94ec60793255d2a448abaef0b56945a88
--- /dev/null
+++ b/graph/incidents_graphml/a/a4a217e0-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.248
+ 100.64.52.248
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398702
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4a217e0-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/a/a4a67a00-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/a/a4a67a00-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23467d22ae278982d74b96fe5c7ac66eb3d8234d
--- /dev/null
+++ b/graph/incidents_graphml/a/a4a67a00-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773037
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4a67a00-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/a/a4a708b0-029b-11ed-9608-918c8d74993e.graphml b/graph/incidents_graphml/a/a4a708b0-029b-11ed-9608-918c8d74993e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f71cb9a366c8e42ea2add21d01f2b5bbd6e7292d
--- /dev/null
+++ b/graph/incidents_graphml/a/a4a708b0-029b-11ed-9608-918c8d74993e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.67
+ 100.64.80.67
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.40
+ USER-0015-1837.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657710302
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4a708b0-029b-11ed-9608-918c8d74993e
+
+
+ INCIDENT_LINK
+ 1657710302
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4a708b0-029b-11ed-9608-918c8d74993e
+
+
+
diff --git a/graph/incidents_graphml/a/a4ac0130-25bc-11ef-8084-11f20777a6f9.graphml b/graph/incidents_graphml/a/a4ac0130-25bc-11ef-8084-11f20777a6f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3467f1a2654d0e88dc4fff15f691c43dbebeb26c
--- /dev/null
+++ b/graph/incidents_graphml/a/a4ac0130-25bc-11ef-8084-11f20777a6f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.80
+ 100.64.16.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717867761
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4ac0130-25bc-11ef-8084-11f20777a6f9
+
+
+
diff --git a/graph/incidents_graphml/a/a4b0e8f0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4b0e8f0-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..644d35b7c859e705c71738f53da2e8b377bba029
--- /dev/null
+++ b/graph/incidents_graphml/a/a4b0e8f0-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.87
+ 100.64.60.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002125
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a4b0e8f0-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a4bea490-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4bea490-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08d32dd422e2ec38df9da1393985a8623b84ae48
--- /dev/null
+++ b/graph/incidents_graphml/a/a4bea490-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.224
+ 100.64.11.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002125
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4bea490-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a4c7a660-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4c7a660-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..542a1d0602bfd92235140fde49a49977f190afff
--- /dev/null
+++ b/graph/incidents_graphml/a/a4c7a660-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.1
+ 100.64.44.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365909
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4c7a660-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a4c9b260-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/a/a4c9b260-45d0-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fca76242bb30f96e4a58861da4812e5e437bd04
--- /dev/null
+++ b/graph/incidents_graphml/a/a4c9b260-45d0-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.161
+ 100.64.69.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1693247291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4c9b260-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4c9b260-45d0-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/a/a4cd5260-2543-11ee-9e0c-a5eef0eff951.graphml b/graph/incidents_graphml/a/a4cd5260-2543-11ee-9e0c-a5eef0eff951.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6d12d7deed7bad476c2e213ffc024f28c24221f
--- /dev/null
+++ b/graph/incidents_graphml/a/a4cd5260-2543-11ee-9e0c-a5eef0eff951.graphml
@@ -0,0 +1,253 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.16
+ USER-0015-1470.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.110
+ 100.64.14.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.17
+ 100.64.66.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.141
+ 100.64.56.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.18
+ 100.64.66.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.19
+ 100.64.66.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+ INCIDENT_LINK
+ 1689668295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4cd5260-2543-11ee-9e0c-a5eef0eff951
+
+
+
diff --git a/graph/incidents_graphml/a/a4cd71a0-f063-11ee-abdc-892822517928.graphml b/graph/incidents_graphml/a/a4cd71a0-f063-11ee-abdc-892822517928.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d33bbb8154480bc15e63b8225de0ae3d9732a58e
--- /dev/null
+++ b/graph/incidents_graphml/a/a4cd71a0-f063-11ee-abdc-892822517928.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.224
+ 100.64.11.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712002125
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4cd71a0-f063-11ee-abdc-892822517928
+
+
+
diff --git a/graph/incidents_graphml/a/a4cecb70-1e10-11ee-9177-87bbc2825325.graphml b/graph/incidents_graphml/a/a4cecb70-1e10-11ee-9177-87bbc2825325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a38cafcbb653ee238c500cb64094c1b15acf3c22
--- /dev/null
+++ b/graph/incidents_graphml/a/a4cecb70-1e10-11ee-9177-87bbc2825325.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688876733
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4cecb70-1e10-11ee-9177-87bbc2825325
+
+
+ INCIDENT_LINK
+ 1688876733
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4cecb70-1e10-11ee-9177-87bbc2825325
+
+
+
diff --git a/graph/incidents_graphml/a/a4d8d450-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/a/a4d8d450-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d86035bc1359022b5367d914c33d4b131f29ac8e
--- /dev/null
+++ b/graph/incidents_graphml/a/a4d8d450-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.198
+ 100.64.38.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.126
+ 100.64.80.126
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.127
+ 100.64.80.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.33.183
+ 100.64.33.183
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a4d8d450-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/a/a4dd9f60-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4dd9f60-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29207d6a14d29c991a9e06d1546af65a7819feea
--- /dev/null
+++ b/graph/incidents_graphml/a/a4dd9f60-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.1
+ 100.64.44.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365909
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4dd9f60-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a4e90040-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a4e90040-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b631914ca8844b67215557fc7354395d18a66abd
--- /dev/null
+++ b/graph/incidents_graphml/a/a4e90040-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134763
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4e90040-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a4ed56d0-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4ed56d0-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0ada175055298c9161800efbba6f7579eed2abd
--- /dev/null
+++ b/graph/incidents_graphml/a/a4ed56d0-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.83
+ USER-0015-1218.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365909
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4ed56d0-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a4ee1e80-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a4ee1e80-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0492bece57d81fdb6cdf5c71e0aef7e5b2fe001
--- /dev/null
+++ b/graph/incidents_graphml/a/a4ee1e80-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.121
+ USER-0015-1433.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299198
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a4ee1e80-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a4fd12a0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a4fd12a0-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a19a5199c09e9053b370bbf644e963172aa90563
--- /dev/null
+++ b/graph/incidents_graphml/a/a4fd12a0-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.121
+ USER-0015-1433.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299198
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4fd12a0-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a4fee300-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a4fee300-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b2c69f3b3630b700acce76f9512112528b1bc6c
--- /dev/null
+++ b/graph/incidents_graphml/a/a4fee300-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.83
+ USER-0015-1218.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365909
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a4fee300-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a50e29a0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a50e29a0-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bbbd07b1c479bfc1ac86ea6640eb2f7b9d023a86
--- /dev/null
+++ b/graph/incidents_graphml/a/a50e29a0-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.42
+ 100.64.43.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299198
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a50e29a0-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a50ee890-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a50ee890-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a81e42bc085dff74747aa4c139cac97505bd24eb
--- /dev/null
+++ b/graph/incidents_graphml/a/a50ee890-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.7
+ 100.64.10.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365909
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a50ee890-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a51f67b0-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a51f67b0-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9dbaafa5383b08370cd3c2a2c735cea8900b8570
--- /dev/null
+++ b/graph/incidents_graphml/a/a51f67b0-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.123
+ 100.64.59.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299198
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a51f67b0-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a521d450-f3b2-11ee-876f-9d44f1915d3d.graphml b/graph/incidents_graphml/a/a521d450-f3b2-11ee-876f-9d44f1915d3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76479178a030a4cf866b5aee78de6e86c36aba07
--- /dev/null
+++ b/graph/incidents_graphml/a/a521d450-f3b2-11ee-876f-9d44f1915d3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.7
+ 100.64.10.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712365909
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a521d450-f3b2-11ee-876f-9d44f1915d3d
+
+
+
diff --git a/graph/incidents_graphml/a/a5285a00-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a5285a00-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76635bff7030d56a06d187cf2c64df9316513936
--- /dev/null
+++ b/graph/incidents_graphml/a/a5285a00-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548930
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5285a00-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a53b45c0-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a53b45c0-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b4c62700381df270ae739d8359e11e28aba5357
--- /dev/null
+++ b/graph/incidents_graphml/a/a53b45c0-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548930
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a53b45c0-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a53dadf0-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a53dadf0-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..359c3d8e033f3d505b13cd5020d996c9c9978013
--- /dev/null
+++ b/graph/incidents_graphml/a/a53dadf0-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.182
+ 100.64.88.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688043939
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a53dadf0-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a54cd740-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a54cd740-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..246a5f7bd42613525558dd869ba82d6da2db2aa7
--- /dev/null
+++ b/graph/incidents_graphml/a/a54cd740-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.173
+ 100.64.39.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821141
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a54cd740-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a54dee70-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/a/a54dee70-2d7b-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3da51d0aa3f1b94a9a75327b6e1212d51f1c1ed0
--- /dev/null
+++ b/graph/incidents_graphml/a/a54dee70-2d7b-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.112.252
+ USER-0015-2105.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 10.181.72.179
+ 10.181.72.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718719455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a54dee70-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a54dee70-2d7b-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/a/a56197c0-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a56197c0-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66d834fd715c7b7798db8ac12e471b247a4df4db
--- /dev/null
+++ b/graph/incidents_graphml/a/a56197c0-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.173
+ 100.64.39.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821141
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a56197c0-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a56d19a0-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a56d19a0-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bce92f817b460c6d55c4ac007abaca362131f899
--- /dev/null
+++ b/graph/incidents_graphml/a/a56d19a0-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823476
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56d19a0-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a56fc550-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a56fc550-6071-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a0181523b011fa336b143c05f351bc6fb98c18d
--- /dev/null
+++ b/graph/incidents_graphml/a/a56fc550-6071-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,725 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.80
+ 100.64.77.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.220
+ 100.64.71.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.3.166
+ 100.64.3.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.173
+ 100.64.1.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.77.81
+ 100.64.77.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.129
+ 100.64.71.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.82
+ 100.64.77.82
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.102
+ 100.64.1.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.83
+ 100.64.77.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.84
+ 100.64.77.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.85
+ 100.64.77.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.32
+ 100.64.73.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.86
+ 100.64.77.86
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.87
+ 100.64.77.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.212
+ 100.64.72.212
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.88
+ 100.64.77.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.89
+ 100.64.77.89
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.90
+ 100.64.77.90
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.91
+ 100.64.77.91
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a56fc550-6071-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a571c120-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a571c120-6071-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d891e1b9bb401bb33d5cc963ad0aacbd52d20f1c
--- /dev/null
+++ b/graph/incidents_graphml/a/a571c120-6071-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.165.183
+ 192.168.165.183
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.148.128.32
+ 10.148.128.32
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a571c120-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027674
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a571c120-6071-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a57b2c20-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a57b2c20-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..546d90ef91b255d94aecf89b96dffa7f8d10287e
--- /dev/null
+++ b/graph/incidents_graphml/a/a57b2c20-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.182
+ 100.64.88.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688043940
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a57b2c20-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7.graphml b/graph/incidents_graphml/a/a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c5cb3577a5e5c5797ea658865633f4fc119d7c2
--- /dev/null
+++ b/graph/incidents_graphml/a/a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7.graphml
@@ -0,0 +1,62 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ CRED
+ CRED-0011
+ ["Suspicious User"]
+ 0.625
+ ["Windows Active Directory","AWS Instance Backup"]
+
+
+ HOST
+ 100.64.83.129
+ HOST-16719
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","AWS Instance Backup"]
+
+
+ INCIDENT_LINK
+ 1676521401
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Suspicious User","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a57b6ee0-adb1-11ed-a9cd-bdbbd3b810c7
+
+
+
diff --git a/graph/incidents_graphml/a/a58304c0-1ca6-11ee-8a30-871cf58c099a.graphml b/graph/incidents_graphml/a/a58304c0-1ca6-11ee-8a30-871cf58c099a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45b48f413eacb5ce7a8a98dcd2d991f2382aa157
--- /dev/null
+++ b/graph/incidents_graphml/a/a58304c0-1ca6-11ee-8a30-871cf58c099a.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.149
+ 100.64.54.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.150
+ 100.64.54.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+ INCIDENT_LINK
+ 1688721256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58304c0-1ca6-11ee-8a30-871cf58c099a
+
+
+
diff --git a/graph/incidents_graphml/a/a5852c30-3ca6-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/a/a5852c30-3ca6-11ee-874c-c948d9dda210.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cbab04b939f503568732fe3e0d6ce3b502d5e28
--- /dev/null
+++ b/graph/incidents_graphml/a/a5852c30-3ca6-11ee-874c-c948d9dda210.graphml
@@ -0,0 +1,437 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.208
+ 100.64.47.208
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.209
+ 100.64.47.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.188
+ 100.64.5.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.162
+ 100.64.7.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.210
+ 100.64.47.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.211
+ 100.64.47.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.15
+ 100.64.25.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.166
+ 100.64.36.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.212
+ 100.64.47.212
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.43
+ 100.64.35.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.213
+ 100.64.47.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5852c30-3ca6-11ee-874c-c948d9dda210
+
+
+
diff --git a/graph/incidents_graphml/a/a58a56f0-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a58a56f0-aa17-11ed-b13a-3357fb14248f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a8b013e13d771ebcd0b07a74233a80ed6e22be6
--- /dev/null
+++ b/graph/incidents_graphml/a/a58a56f0-aa17-11ed-b13a-3357fb14248f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.30
+ 100.64.86.30
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676125405
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a58a56f0-aa17-11ed-b13a-3357fb14248f
+
+
+
diff --git a/graph/incidents_graphml/a/a58d3d20-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a58d3d20-aa17-11ed-b13a-3357fb14248f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc8b7375c17bac9746e683dce9661a3acaae6248
--- /dev/null
+++ b/graph/incidents_graphml/a/a58d3d20-aa17-11ed-b13a-3357fb14248f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676125405
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a58d3d20-aa17-11ed-b13a-3357fb14248f
+
+
+
diff --git a/graph/incidents_graphml/a/a590eae0-2d7b-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/a/a590eae0-2d7b-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9f136322380aeb83249e1db9feb612272daa0cb
--- /dev/null
+++ b/graph/incidents_graphml/a/a590eae0-2d7b-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.149.108.24
+ 10.149.108.24
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.33
+ 100.64.3.33
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718719455
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a590eae0-2d7b-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719455
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a590eae0-2d7b-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/a/a591a9f0-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a591a9f0-aa17-11ed-b13a-3357fb14248f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8c83652ca0f743504c766edd20f9d9ea584c2fc
--- /dev/null
+++ b/graph/incidents_graphml/a/a591a9f0-aa17-11ed-b13a-3357fb14248f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676125405
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a591a9f0-aa17-11ed-b13a-3357fb14248f
+
+
+
diff --git a/graph/incidents_graphml/a/a5970120-aa17-11ed-b13a-3357fb14248f.graphml b/graph/incidents_graphml/a/a5970120-aa17-11ed-b13a-3357fb14248f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5b2d9fd62810d6f7175ed95a541bddf7a043302
--- /dev/null
+++ b/graph/incidents_graphml/a/a5970120-aa17-11ed-b13a-3357fb14248f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.31
+ 100.64.86.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676125405
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5970120-aa17-11ed-b13a-3357fb14248f
+
+
+
diff --git a/graph/incidents_graphml/a/a59b2530-3ca6-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/a/a59b2530-3ca6-11ee-874c-c948d9dda210.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d20954491143794a907c63c6eadf73c2f64a05c1
--- /dev/null
+++ b/graph/incidents_graphml/a/a59b2530-3ca6-11ee-874c-c948d9dda210.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.68
+ 100.64.25.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.105
+ 100.64.40.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.222
+ 100.64.47.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.139
+ 100.64.35.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.223
+ 100.64.47.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.224
+ 100.64.47.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.225
+ 100.64.47.225
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+ INCIDENT_LINK
+ 1692239693
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a59b2530-3ca6-11ee-874c-c948d9dda210
+
+
+
diff --git a/graph/incidents_graphml/a/a59e6440-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a59e6440-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edb8f898219dbbacb5b05db43142550147757c6c
--- /dev/null
+++ b/graph/incidents_graphml/a/a59e6440-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.9
+ USER-0015-1637.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211921
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a59e6440-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a5b9b300-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a5b9b300-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1faa00a02fe38ffba695d361442d2b3032ee1dd
--- /dev/null
+++ b/graph/incidents_graphml/a/a5b9b300-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.204
+ 100.64.46.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5b9b300-1d94-11ee-8e9e-f91508f5bdfe
+
+
+ INCIDENT_LINK
+ 1688823476
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5b9b300-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3.graphml b/graph/incidents_graphml/a/a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce8b8550d2b2a8c20d8d1b7b882d6f08bc5817aa
--- /dev/null
+++ b/graph/incidents_graphml/a/a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.107
+ 100.64.72.107
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.108
+ 100.64.72.108
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690711115
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711115
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711115
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+ INCIDENT_LINK
+ 1690711115
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5bc0ce0-2ebf-11ee-9131-1117bdeaaaa3
+
+
+
diff --git a/graph/incidents_graphml/a/a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa45f8f5d77bf60a101b1922f1f24193f4d1f9d9
--- /dev/null
+++ b/graph/incidents_graphml/a/a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821142
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5bed2f0-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a5bfe050-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/a/a5bfe050-9daa-11ed-a07d-2388b6eb4361.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b6b3d040f90884cec4f5d25e01d7aa653653d11
--- /dev/null
+++ b/graph/incidents_graphml/a/a5bfe050-9daa-11ed-a07d-2388b6eb4361.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674759176
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a5bfe050-9daa-11ed-a07d-2388b6eb4361
+
+
+
diff --git a/graph/incidents_graphml/a/a5c69710-9daa-11ed-a07d-2388b6eb4361.graphml b/graph/incidents_graphml/a/a5c69710-9daa-11ed-a07d-2388b6eb4361.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8236109e06dc6cfa3fa1e245074cfeb7a8d969e1
--- /dev/null
+++ b/graph/incidents_graphml/a/a5c69710-9daa-11ed-a07d-2388b6eb4361.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.12.59
+ 100.64.12.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674759176
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5c69710-9daa-11ed-a07d-2388b6eb4361
+
+
+
diff --git a/graph/incidents_graphml/a/a5c981d0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a5c981d0-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f41ee5588f56069a1f70d8cedcde2cd5a1ef783
--- /dev/null
+++ b/graph/incidents_graphml/a/a5c981d0-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.149
+ 100.64.81.149
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668613937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5c981d0-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5c981d0-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/a/a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb08d7898c7ecaff96a5aa03ef0e410884067614
--- /dev/null
+++ b/graph/incidents_graphml/a/a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.130.247.61
+ 10.130.247.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.128
+ 100.64.82.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690196578
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196578
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5cb9fa0-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/a/a5cc6800-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/a/a5cc6800-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcffd06d9d7d03912cc9aebed815947565b002cf
--- /dev/null
+++ b/graph/incidents_graphml/a/a5cc6800-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.150
+ 100.64.81.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668613937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5cc6800-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613937
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5cc6800-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/a/a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45601ae3702c33ff5c33ef2748a0f355741d9bbb
--- /dev/null
+++ b/graph/incidents_graphml/a/a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821142
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5d2d020-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b11ca39b20fac2ac0028352d10fecaecfc39fb2
--- /dev/null
+++ b/graph/incidents_graphml/a/a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.204
+ 100.64.46.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823477
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a5dbb9f0-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a5e67d00-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a5e67d00-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..581d1a374122e9d23cc0a8c0ff6f00e4c2f2af9f
--- /dev/null
+++ b/graph/incidents_graphml/a/a5e67d00-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.200
+ 100.64.88.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139316
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e67d00-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/a/a5e70600-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a5e70600-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7a741ee20d0bf9c55a1085b83ae037a01a75eaa
--- /dev/null
+++ b/graph/incidents_graphml/a/a5e70600-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.9
+ USER-0015-1637.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211922
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5e70600-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a5e96390-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a5e96390-47db-11ee-b496-6fe4711b3325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dede123ff21ef90ee9b3ca27a0daa077550b19cb
--- /dev/null
+++ b/graph/incidents_graphml/a/a5e96390-47db-11ee-b496-6fe4711b3325.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.196
+ 100.64.38.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.106
+ 100.64.17.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.157
+ 100.64.9.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.16
+ 100.64.52.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.17
+ 100.64.52.17
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.228
+ 100.64.37.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.18
+ 100.64.52.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.19
+ 100.64.52.19
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.20
+ 100.64.52.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.191
+ 100.64.9.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.21
+ 100.64.52.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.22
+ 100.64.52.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471920
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5e96390-47db-11ee-b496-6fe4711b3325
+
+
+
diff --git a/graph/incidents_graphml/a/a5ea2d60-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/a/a5ea2d60-09ab-11ef-a326-59a1bcca7fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa98dc25770c542132ea0cd7438cd4cfea37b10d
--- /dev/null
+++ b/graph/incidents_graphml/a/a5ea2d60-09ab-11ef-a326-59a1bcca7fdf.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.12
+ 100.64.2.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.111
+ 100.64.34.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.49
+ 100.64.49.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714781830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5ea2d60-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5ea2d60-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5ea2d60-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5ea2d60-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5ea2d60-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781830
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a5ea2d60-09ab-11ef-a326-59a1bcca7fdf
+
+
+
diff --git a/graph/incidents_graphml/a/a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/a/a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cada68fd8cf3dafa13107fa49b3b29fd00c7dd59
--- /dev/null
+++ b/graph/incidents_graphml/a/a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.212
+ 100.64.88.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a5ed5ad0-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/a/a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef72e703d6937f305bf74302bdd55a42f5cdad23
--- /dev/null
+++ b/graph/incidents_graphml/a/a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.251
+ 100.64.66.251
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.233
+ 100.64.73.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5ef4cc0-15a3-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a5f4a3e0-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a5f4a3e0-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63c200691aff4e12ec3d4e281d02f99c5883350d
--- /dev/null
+++ b/graph/incidents_graphml/a/a5f4a3e0-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134765
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5f4a3e0-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a5fb5370-d4fd-11ee-b65b-9d9885766d0d.graphml b/graph/incidents_graphml/a/a5fb5370-d4fd-11ee-b65b-9d9885766d0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b722e6e9d4f06abf8acdc211ac9a245a12f1402
--- /dev/null
+++ b/graph/incidents_graphml/a/a5fb5370-d4fd-11ee-b65b-9d9885766d0d.graphml
@@ -0,0 +1,895 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.157
+ 100.64.27.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.158
+ 100.64.27.158
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.100
+ 100.64.22.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.159
+ 100.64.27.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.160
+ 100.64.27.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.161
+ 100.64.27.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.181
+ 100.64.8.181
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.162
+ 100.64.27.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.27
+ 100.64.21.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.163
+ 100.64.27.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.118
+ 100.64.8.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.164
+ 100.64.27.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.11
+ 100.64.25.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.165
+ 100.64.27.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.166
+ USER-0015-1265.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.10
+ 100.64.8.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989637
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a5fb5370-d4fd-11ee-b65b-9d9885766d0d
+
+
+
diff --git a/graph/incidents_graphml/a/a5ff4780-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a5ff4780-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..219b2e6a02e05d17651b7c2534b73d9f1f3d440d
--- /dev/null
+++ b/graph/incidents_graphml/a/a5ff4780-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.204
+ 100.64.46.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823477
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a5ff4780-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a6014e20-15a3-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a6014e20-15a3-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2593b0b42a6214a141fb636719ea22342280d972
--- /dev/null
+++ b/graph/incidents_graphml/a/a6014e20-15a3-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.91
+ 100.64.40.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.220
+ 100.64.71.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.234
+ 100.64.73.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.235
+ 100.64.73.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6014e20-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6014e20-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6014e20-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6014e20-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6014e20-15a3-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687950310
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6014e20-15a3-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a6022c30-39b8-11ee-84c9-adc60bfa2a04.graphml b/graph/incidents_graphml/a/a6022c30-39b8-11ee-84c9-adc60bfa2a04.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6ac70ac6379ce1beae53cc034aa2335af1f0b9c
--- /dev/null
+++ b/graph/incidents_graphml/a/a6022c30-39b8-11ee-84c9-adc60bfa2a04.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.7.183
+ 172.18.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.35
+ USER-0015-2058.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691917571
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6022c30-39b8-11ee-84c9-adc60bfa2a04
+
+
+ INCIDENT_LINK
+ 1691917571
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6022c30-39b8-11ee-84c9-adc60bfa2a04
+
+
+
diff --git a/graph/incidents_graphml/a/a6074180-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a6074180-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..014b4b2ae763b539f8589c15290e38828b94ae7a
--- /dev/null
+++ b/graph/incidents_graphml/a/a6074180-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.133
+ 100.64.13.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6074180-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a610c7e0-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/a/a610c7e0-2c8a-11ed-be76-c750f0345c87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37fa7fae7baa67037b243d51a7583890e041bc73
--- /dev/null
+++ b/graph/incidents_graphml/a/a610c7e0-2c8a-11ed-be76-c750f0345c87.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.226
+ 100.64.71.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.250
+ 100.64.70.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662320952
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a610c7e0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320952
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a610c7e0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320952
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a610c7e0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320952
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a610c7e0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320952
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a610c7e0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320952
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a610c7e0-2c8a-11ed-be76-c750f0345c87
+
+
+
diff --git a/graph/incidents_graphml/a/a61635a0-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a61635a0-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d39a6cb05416b089213e919d90dae20e139aefc0
--- /dev/null
+++ b/graph/incidents_graphml/a/a61635a0-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.123
+ 100.64.8.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134765
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a61635a0-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a62595a0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a62595a0-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f28ecf14b6a9961c26096e3a15476cb664c5b0a1
--- /dev/null
+++ b/graph/incidents_graphml/a/a62595a0-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.181
+ 100.64.72.181
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211922
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a62595a0-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a636de70-555c-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/a/a636de70-555c-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..318421f1c7c936795058154598b88467d38a0852
--- /dev/null
+++ b/graph/incidents_graphml/a/a636de70-555c-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.28
+ USER-0015-1345.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694956691
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a636de70-555c-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/a/a647ff60-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a647ff60-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c063a84308f4c7498b4076d642931f0b6631950
--- /dev/null
+++ b/graph/incidents_graphml/a/a647ff60-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.51
+ 100.64.63.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.81
+ 100.64.47.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.52
+ 100.64.63.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.22
+ 100.64.28.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.3
+ 100.64.34.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.53
+ 100.64.63.53
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.54
+ 100.64.63.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.55
+ 100.64.63.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.227
+ 100.64.34.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a647ff60-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/a/a65944e0-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/a/a65944e0-9947-11ee-986d-1bbc30865dce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..601c90c635efb789c68c47a5cb3b147dc8ddf6cb
--- /dev/null
+++ b/graph/incidents_graphml/a/a65944e0-9947-11ee-986d-1bbc30865dce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.251
+ 100.64.43.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702424350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a65944e0-9947-11ee-986d-1bbc30865dce
+
+
+
diff --git a/graph/incidents_graphml/a/a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66.graphml b/graph/incidents_graphml/a/a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05778394bdf1e89dbbbc38009cc6c172ca210ed6
--- /dev/null
+++ b/graph/incidents_graphml/a/a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.94
+ 100.64.71.94
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1658927499
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a65e13c0-0dad-11ed-ab9d-bfbb3b98ef66
+
+
+
diff --git a/graph/incidents_graphml/a/a6606960-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a6606960-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92d2e65b0ba7799b03ea7d0bda22fefa06c45b22
--- /dev/null
+++ b/graph/incidents_graphml/a/a6606960-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.90
+ 100.64.12.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.61
+ 100.64.63.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.62
+ 100.64.63.62
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.63
+ 100.64.63.63
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.64
+ 100.64.63.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.221
+ USER-0015-1424.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893354
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6606960-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/a/a666a660-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a666a660-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c593a282ef81264686eba40d3d7667e9b0fc10d3
--- /dev/null
+++ b/graph/incidents_graphml/a/a666a660-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.153
+ 100.64.35.153
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548932
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a666a660-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a6677810-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a6677810-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0b0168c31fab309e26cad5f3e791bf301d55aad
--- /dev/null
+++ b/graph/incidents_graphml/a/a6677810-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.38
+ 100.64.6.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299201
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a6677810-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a66b17d0-4166-11ee-89c1-af7b5492d246.graphml b/graph/incidents_graphml/a/a66b17d0-4166-11ee-89c1-af7b5492d246.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40729743965fc45fed25a7d71d604eef7a9850e9
--- /dev/null
+++ b/graph/incidents_graphml/a/a66b17d0-4166-11ee-89c1-af7b5492d246.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.18.177
+ 100.64.18.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692761963
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a66b17d0-4166-11ee-89c1-af7b5492d246
+
+
+
diff --git a/graph/incidents_graphml/a/a6736780-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a6736780-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b567bced95300db8341ad38e8c907be29a99c56
--- /dev/null
+++ b/graph/incidents_graphml/a/a6736780-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.179
+ 100.64.72.179
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211922
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a6736780-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a6748c90-47db-11ee-b496-6fe4711b3325.graphml b/graph/incidents_graphml/a/a6748c90-47db-11ee-b496-6fe4711b3325.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb3f32d73a6eb25e1c1c1ae70bea979cf1221c33
--- /dev/null
+++ b/graph/incidents_graphml/a/a6748c90-47db-11ee-b496-6fe4711b3325.graphml
@@ -0,0 +1,799 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.136
+ 100.64.18.136
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.46
+ 100.64.36.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.30
+ 100.64.52.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.31
+ 100.64.52.31
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.32
+ 100.64.52.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.177
+ 100.64.23.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.33
+ 100.64.52.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.22
+ 100.64.18.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.106
+ 100.64.49.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.179
+ 100.64.15.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.179
+ 100.64.26.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.252
+ 100.64.36.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.34
+ 100.64.52.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.35
+ 100.64.52.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.36
+ 100.64.52.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.37
+ 100.64.52.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.38
+ 100.64.52.38
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.39
+ 100.64.52.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+ INCIDENT_LINK
+ 1693471921
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6748c90-47db-11ee-b496-6fe4711b3325
+
+
+
diff --git a/graph/incidents_graphml/a/a6770870-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a6770870-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..655589c116b7d4fa88657ec36b54c508a0ae94f1
--- /dev/null
+++ b/graph/incidents_graphml/a/a6770870-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.38
+ 100.64.6.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299201
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a6770870-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/a/a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9107b8fcc86cad88f2ee72428410c84e0effcc26
--- /dev/null
+++ b/graph/incidents_graphml/a/a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.167
+ 100.64.80.167
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.41.147
+ USER-0015-1844.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.168
+ 100.64.80.168
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490188
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6845ca0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+
diff --git a/graph/incidents_graphml/a/a686afc0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a686afc0-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67f0e04aa4b714c5ebd355d98fda04dd285d2430
--- /dev/null
+++ b/graph/incidents_graphml/a/a686afc0-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.1
+ 100.64.66.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a686afc0-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a68a7410-d4fd-11ee-b65b-9d9885766d0d.graphml b/graph/incidents_graphml/a/a68a7410-d4fd-11ee-b65b-9d9885766d0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..769b7e4cc3982a09956da592c48f774f388e9c03
--- /dev/null
+++ b/graph/incidents_graphml/a/a68a7410-d4fd-11ee-b65b-9d9885766d0d.graphml
@@ -0,0 +1,845 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.177
+ 100.64.27.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.11
+ 100.64.25.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.151
+ 100.64.8.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.178
+ 100.64.27.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.179
+ 100.64.27.179
+ ["Exploiting Host"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.83
+ 100.64.23.83
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.62
+ 100.64.22.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.180
+ 100.64.27.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.198
+ 100.64.14.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.181
+ 100.64.27.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.234
+ 100.64.25.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.182
+ 100.64.27.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989638
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a68a7410-d4fd-11ee-b65b-9d9885766d0d
+
+
+
diff --git a/graph/incidents_graphml/a/a694b980-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a694b980-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..150c28a051833e30bef72e161975e6bc9d23fa38
--- /dev/null
+++ b/graph/incidents_graphml/a/a694b980-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.2
+ 100.64.66.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a694b980-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a6a138d0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a6a138d0-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18e2febd410debd23ce222e7de795a04beaacb49
--- /dev/null
+++ b/graph/incidents_graphml/a/a6a138d0-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.112
+ 100.64.43.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687961478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6a138d0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6a138d0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6a138d0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961478
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6a138d0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a6a50d30-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a6a50d30-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6a10408934288ee9a7257aeed1fd012983a5699
--- /dev/null
+++ b/graph/incidents_graphml/a/a6a50d30-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.2
+ 100.64.66.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a6a50d30-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a6ae2690-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a6ae2690-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7dde6fdcf98091e14d3bd5ee57f277905515ee6
--- /dev/null
+++ b/graph/incidents_graphml/a/a6ae2690-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.179
+ 100.64.72.179
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211923
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6ae2690-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a6b9c7c0-482f-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/a/a6b9c7c0-482f-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20f3b1ab59bfb4624772e4eabc15bb49201e30df
--- /dev/null
+++ b/graph/incidents_graphml/a/a6b9c7c0-482f-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.220
+ 100.64.52.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.130
+ 100.64.56.130
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.136
+ 100.64.54.136
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.131
+ 100.64.56.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.90
+ 100.64.41.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.132
+ 100.64.56.132
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.94
+ 100.64.37.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.133
+ 100.64.56.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.100
+ 100.64.21.100
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.239
+ 100.64.13.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.134
+ 100.64.56.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.135
+ 100.64.56.135
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.179
+ 100.64.52.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.154
+ 100.64.33.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.221
+ 100.64.13.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693507999
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6b9c7c0-482f-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/a/a6c0e340-72da-11ee-8d2c-297df9484f05.graphml b/graph/incidents_graphml/a/a6c0e340-72da-11ee-8d2c-297df9484f05.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3be6c5d2054d7ff1c2e991645d6da152c3d323c2
--- /dev/null
+++ b/graph/incidents_graphml/a/a6c0e340-72da-11ee-8d2c-297df9484f05.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.83
+ 100.64.60.83
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698199392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a6c0e340-72da-11ee-8d2c-297df9484f05
+
+
+
diff --git a/graph/incidents_graphml/a/a6cb8740-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a6cb8740-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b6d57f9a2f26040e69cfefed33dc46892ffcfab
--- /dev/null
+++ b/graph/incidents_graphml/a/a6cb8740-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.69
+ 100.64.63.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.25
+ 100.64.12.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.70
+ USER-0015-1451.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6cb8740-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6cb8740-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6cb8740-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6cb8740-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6cb8740-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893355
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6cb8740-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/a/a6d27600-1d94-11ee-8e9e-f91508f5bdfe.graphml b/graph/incidents_graphml/a/a6d27600-1d94-11ee-8e9e-f91508f5bdfe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba088ae5b92d2c593eec508b326400c56b327883
--- /dev/null
+++ b/graph/incidents_graphml/a/a6d27600-1d94-11ee-8e9e-f91508f5bdfe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.107
+ 100.64.7.107
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688823478
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6d27600-1d94-11ee-8e9e-f91508f5bdfe
+
+
+
diff --git a/graph/incidents_graphml/a/a6d8d860-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a6d8d860-14b1-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ca523ef74742edb27b51be76f2075c4551236b7
--- /dev/null
+++ b/graph/incidents_graphml/a/a6d8d860-14b1-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.22.102
+ 100.64.22.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.30.68
+ 100.64.30.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.135
+ 100.64.79.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6d8d860-14b1-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/a/a6eb27e0-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a6eb27e0-14b1-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ca3a5fa8fb374c4fc57a80cecea9c0efc333dd1
--- /dev/null
+++ b/graph/incidents_graphml/a/a6eb27e0-14b1-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.136
+ 100.64.79.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.76
+ 100.64.74.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.137
+ 100.64.79.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.138
+ 100.64.79.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6eb27e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6eb27e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6eb27e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6eb27e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6eb27e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846373
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6eb27e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/a/a6ebf2e0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a6ebf2e0-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38cd5430da4b4cf71c18c3c42dc922ad2e2dd621
--- /dev/null
+++ b/graph/incidents_graphml/a/a6ebf2e0-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.180
+ USER-0015-1638.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211923
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a6ebf2e0-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a6f02700-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a6f02700-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..499076bfa79d728df0e3532478d5c6d5aca93f0d
--- /dev/null
+++ b/graph/incidents_graphml/a/a6f02700-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.197
+ USER-0015-1283.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821144
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a6f02700-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a6f67a30-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a6f67a30-21f1-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1831cf55b5d9bde258bbc2e5acfad3715900b381
--- /dev/null
+++ b/graph/incidents_graphml/a/a6f67a30-21f1-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1689303226
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6f67a30-21f1-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/a/a6ff30b0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a6ff30b0-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49611eebae1e72b7309c5a09c3f01ffd6a610b29
--- /dev/null
+++ b/graph/incidents_graphml/a/a6ff30b0-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.107
+ 100.64.57.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a6ff30b0-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a7004550-00b8-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/a/a7004550-00b8-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..762c5e908c7328cf6d29bbcd0c8886be2e0a5f5a
--- /dev/null
+++ b/graph/incidents_graphml/a/a7004550-00b8-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.103
+ 100.64.18.103
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ INCIDENT_LINK
+ 1713797854
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7004550-00b8-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797854
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7004550-00b8-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/a/a708b810-dc8d-11ee-bb7b-7127cbf2c01f.graphml b/graph/incidents_graphml/a/a708b810-dc8d-11ee-bb7b-7127cbf2c01f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec3cf1a13801127e97df5ebbeaab4bcf83cc2c9f
--- /dev/null
+++ b/graph/incidents_graphml/a/a708b810-dc8d-11ee-bb7b-7127cbf2c01f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.197
+ USER-0015-1283.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709821144
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a708b810-dc8d-11ee-bb7b-7127cbf2c01f
+
+
+
diff --git a/graph/incidents_graphml/a/a70d9320-9c9c-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/a/a70d9320-9c9c-11ee-b60c-751684393f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0633458b8bc9aff12325461bac9c26b84351f2da
--- /dev/null
+++ b/graph/incidents_graphml/a/a70d9320-9c9c-11ee-b60c-751684393f5d.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.121
+ 100.64.68.121
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.8.78
+ 100.64.8.78
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.122
+ 100.64.68.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.250
+ 100.64.22.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790712
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a70d9320-9c9c-11ee-b60c-751684393f5d
+
+
+
diff --git a/graph/incidents_graphml/a/a714bae0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/a/a714bae0-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..665d9cd69331e6e76a792f8f887530970416c9ff
--- /dev/null
+++ b/graph/incidents_graphml/a/a714bae0-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.214
+ 100.64.58.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773041
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a714bae0-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/a/a714de20-7ac6-11ee-a3e7-4d4a8f436180.graphml b/graph/incidents_graphml/a/a714de20-7ac6-11ee-a3e7-4d4a8f436180.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2597a2f75952cb25e8ed9fa01840b8eb13904a9c
--- /dev/null
+++ b/graph/incidents_graphml/a/a714de20-7ac6-11ee-a3e7-4d4a8f436180.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.137
+ 100.64.36.137
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"]
+
+
+ HOST
+ 100.64.70.118
+ 100.64.70.118
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.42.223
+ 100.64.42.223
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.325
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ a714de20-7ac6-11ee-a3e7-4d4a8f436180
+
+
+
diff --git a/graph/incidents_graphml/a/a71c51b0-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a71c51b0-21f1-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4973a4eabba2dc42b7590bd082c35dbf8cf72745
--- /dev/null
+++ b/graph/incidents_graphml/a/a71c51b0-21f1-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689303227
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a71c51b0-21f1-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/a/a720c270-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a720c270-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8e519a8c0bced6fcbae639a96a32ef728c67b4d
--- /dev/null
+++ b/graph/incidents_graphml/a/a720c270-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.107
+ 100.64.57.107
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a720c270-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a724e3b0-7ac6-11ee-a3e7-4d4a8f436180.graphml b/graph/incidents_graphml/a/a724e3b0-7ac6-11ee-a3e7-4d4a8f436180.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a1d77fe4d4518e372c1a6e179b78863a5510aca
--- /dev/null
+++ b/graph/incidents_graphml/a/a724e3b0-7ac6-11ee-a3e7-4d4a8f436180.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.45.135
+ 100.64.45.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a724e3b0-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a724e3b0-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a724e3b0-7ac6-11ee-a3e7-4d4a8f436180
+
+
+ INCIDENT_LINK
+ 1699070412
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a724e3b0-7ac6-11ee-a3e7-4d4a8f436180
+
+
+
diff --git a/graph/incidents_graphml/a/a726e050-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a726e050-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5b46df9d53abb439d08238660f96c2e012db121
--- /dev/null
+++ b/graph/incidents_graphml/a/a726e050-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.83.50
+ 100.64.83.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688043942
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a726e050-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a7281fe0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7281fe0-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08d6f99dfbb58888bba2ea2e94c8a54a850814d0
--- /dev/null
+++ b/graph/incidents_graphml/a/a7281fe0-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.4
+ 100.64.66.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7281fe0-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a72fd9b0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a72fd9b0-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45f01125eceb6513f59b040278453e41e0bd98fc
--- /dev/null
+++ b/graph/incidents_graphml/a/a72fd9b0-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.180
+ USER-0015-1638.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a72fd9b0-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a7364b60-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a7364b60-27c4-11ed-b92c-490402bdd5e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff9bd8968aac95b10c589281afeb8cb80c861ae7
--- /dev/null
+++ b/graph/incidents_graphml/a/a7364b60-27c4-11ed-b92c-490402bdd5e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661796109
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7364b60-27c4-11ed-b92c-490402bdd5e6
+
+
+
diff --git a/graph/incidents_graphml/a/a7369ed0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7369ed0-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21d24628435726e140c59741498c0c011e5ddb4f
--- /dev/null
+++ b/graph/incidents_graphml/a/a7369ed0-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.4
+ 100.64.66.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7369ed0-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a73c65e0-27c4-11ed-b92c-490402bdd5e6.graphml b/graph/incidents_graphml/a/a73c65e0-27c4-11ed-b92c-490402bdd5e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8988f8d5666c2ddf52039394da0f210be3a0568
--- /dev/null
+++ b/graph/incidents_graphml/a/a73c65e0-27c4-11ed-b92c-490402bdd5e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661796109
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a73c65e0-27c4-11ed-b92c-490402bdd5e6
+
+
+
diff --git a/graph/incidents_graphml/a/a7440bb0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a7440bb0-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a56d33d8086dd478273ce9609edfdee25da7d0da
--- /dev/null
+++ b/graph/incidents_graphml/a/a7440bb0-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.155
+ 100.64.23.155
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063471
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7440bb0-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a7448180-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7448180-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e9cf5acaeafbf3d87d7775a3448fea6565e827e
--- /dev/null
+++ b/graph/incidents_graphml/a/a7448180-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.5
+ 100.64.66.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932543
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7448180-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a746ab50-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/a/a746ab50-1d36-11ee-9ab6-a3b5d64e58f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3efff17ec9eec8f0bd3e8a700ca9c3715ba508a
--- /dev/null
+++ b/graph/incidents_graphml/a/a746ab50-1d36-11ee-9ab6-a3b5d64e58f9.graphml
@@ -0,0 +1,509 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.45.149
+ 100.64.45.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.163
+ 100.64.82.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.63.90
+ 100.64.63.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.104
+ USER-0015-1635.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Umbrella","Meraki"]
+
+
+ HOST
+ 100.64.10.103
+ 100.64.10.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.38.10
+ 100.64.38.10
+ ["Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.164
+ 100.64.82.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.165
+ 100.64.82.165
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.166
+ 100.64.82.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783106
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a746ab50-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+
diff --git a/graph/incidents_graphml/a/a74c1d90-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a74c1d90-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cca9b5c384ebb89c6b0fb79c9dadcd9f68d9e52f
--- /dev/null
+++ b/graph/incidents_graphml/a/a74c1d90-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.53
+ 100.64.54.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134767
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a74c1d90-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a74cb470-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a74cb470-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..544d3201c195ca6c06f1fd0f8617ff30f1ddfdfc
--- /dev/null
+++ b/graph/incidents_graphml/a/a74cb470-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368510
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a74cb470-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a74cd400-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a74cd400-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..03f42325f6f8b921d660a4730f460f4750ffd2cc
--- /dev/null
+++ b/graph/incidents_graphml/a/a74cd400-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.196
+ 100.64.24.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638435
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a74cd400-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a752d960-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a752d960-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfd423e67693c742146cd9f2482046ba98a15d98
--- /dev/null
+++ b/graph/incidents_graphml/a/a752d960-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.5
+ 100.64.66.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932544
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a752d960-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a7534030-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a7534030-21f1-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9dfda7fd889b38cafe2a744423f3e22a3ce06f2
--- /dev/null
+++ b/graph/incidents_graphml/a/a7534030-21f1-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.216.198
+ 172.25.216.198
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.3
+ 100.64.96.3
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1689303227
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7534030-21f1-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/a/a754d490-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a754d490-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cfe008ea10a2cef9171ced66b7040536bd010e1
--- /dev/null
+++ b/graph/incidents_graphml/a/a754d490-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.155
+ 100.64.23.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063471
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a754d490-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a754f020-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a754f020-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9c42edc9ef1dbc8cffa1835e3eeab4d36d1c692
--- /dev/null
+++ b/graph/incidents_graphml/a/a754f020-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.60
+ 100.64.39.60
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473245
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a754f020-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/a/a75c2320-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a75c2320-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a396f43b9f02fdab326c2583158701c1ffa78ed
--- /dev/null
+++ b/graph/incidents_graphml/a/a75c2320-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.53
+ 100.64.54.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134767
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a75c2320-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a7621ba0-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a7621ba0-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f9afc1ee3b4d115bbe7ddaad488bf954e9481e8
--- /dev/null
+++ b/graph/incidents_graphml/a/a7621ba0-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.50
+ 100.64.10.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932544
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7621ba0-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a7694280-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a7694280-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39f323793e29c4b667eeb5c9ef600ec924b95787
--- /dev/null
+++ b/graph/incidents_graphml/a/a7694280-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134767
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7694280-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a7696430-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7696430-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c64f8479ca3a35166fe4722d49e28ccf492cf10
--- /dev/null
+++ b/graph/incidents_graphml/a/a7696430-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.105
+ 100.64.11.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368511
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7696430-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a76a95f0-46d6-11ee-88e7-8bd8925a1b5c.graphml b/graph/incidents_graphml/a/a76a95f0-46d6-11ee-88e7-8bd8925a1b5c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61598d51760b69ca947b35e22a799ad8d48508ca
--- /dev/null
+++ b/graph/incidents_graphml/a/a76a95f0-46d6-11ee-88e7-8bd8925a1b5c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.209
+ 100.64.49.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693359824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a76a95f0-46d6-11ee-88e7-8bd8925a1b5c
+
+
+
diff --git a/graph/incidents_graphml/a/a76c21a0-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a76c21a0-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7287b88f158c09b67623450b4f80e0e949d3ad68
--- /dev/null
+++ b/graph/incidents_graphml/a/a76c21a0-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.164
+ 100.64.40.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473245
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a76c21a0-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/a/a775a2d0-921f-11ee-be22-3fd83eb9bc8a.graphml b/graph/incidents_graphml/a/a775a2d0-921f-11ee-be22-3fd83eb9bc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..510d385ddc942e3f93cb6b42d8f79bbda434e4a4
--- /dev/null
+++ b/graph/incidents_graphml/a/a775a2d0-921f-11ee-be22-3fd83eb9bc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.29
+ 100.64.25.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701637514
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a775a2d0-921f-11ee-be22-3fd83eb9bc8a
+
+
+
diff --git a/graph/incidents_graphml/a/a77884c0-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a77884c0-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f76631b79495a01f1a97b96a6e6967c898e5b1fe
--- /dev/null
+++ b/graph/incidents_graphml/a/a77884c0-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.110
+ 100.64.8.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134767
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a77884c0-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a77e9830-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a77e9830-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1838edd67640bcc726f019836956b217b23d57fd
--- /dev/null
+++ b/graph/incidents_graphml/a/a77e9830-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.164
+ 100.64.40.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473246
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a77e9830-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/a/a7815900-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7815900-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e45ed700e8d22abccf79e4c8d1ccdd64e020441
--- /dev/null
+++ b/graph/incidents_graphml/a/a7815900-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.109
+ 100.64.57.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7815900-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a785cb30-44ca-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/a/a785cb30-44ca-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e198646ddd04a07c9109424a69a7251912272c89
--- /dev/null
+++ b/graph/incidents_graphml/a/a785cb30-44ca-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693134768
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a785cb30-44ca-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/a/a78c1100-921f-11ee-be22-3fd83eb9bc8a.graphml b/graph/incidents_graphml/a/a78c1100-921f-11ee-be22-3fd83eb9bc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a8b81f31c44c6c230d43e6653a7d5b5dd888e44
--- /dev/null
+++ b/graph/incidents_graphml/a/a78c1100-921f-11ee-be22-3fd83eb9bc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.29
+ 100.64.25.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701637514
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a78c1100-921f-11ee-be22-3fd83eb9bc8a
+
+
+
diff --git a/graph/incidents_graphml/a/a78f4620-7985-11ee-ade7-bf8e12a3a664.graphml b/graph/incidents_graphml/a/a78f4620-7985-11ee-ade7-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d43375907bd2dd08cd33e1fa50b0b3d2b3aca651
--- /dev/null
+++ b/graph/incidents_graphml/a/a78f4620-7985-11ee-ade7-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.8
+ 100.64.66.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698932544
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a78f4620-7985-11ee-ade7-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/a/a79ad470-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a79ad470-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32863164290d371a8de2e3ab8d4c2838e94d6eae
--- /dev/null
+++ b/graph/incidents_graphml/a/a79ad470-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.109
+ 100.64.57.109
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368511
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a79ad470-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a79b5340-921f-11ee-be22-3fd83eb9bc8a.graphml b/graph/incidents_graphml/a/a79b5340-921f-11ee-be22-3fd83eb9bc8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35f60d5755c7efa9f65d6d9bcccc7c1b4b80a5df
--- /dev/null
+++ b/graph/incidents_graphml/a/a79b5340-921f-11ee-be22-3fd83eb9bc8a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.118
+ 100.64.8.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701637514
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a79b5340-921f-11ee-be22-3fd83eb9bc8a
+
+
+
diff --git a/graph/incidents_graphml/a/a7a13920-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a7a13920-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68bf903951aa29dcdf0f9a97c53630bbe116f96a
--- /dev/null
+++ b/graph/incidents_graphml/a/a7a13920-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.182
+ USER-0015-1639.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211924
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7a13920-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a7a21920-0040-11ef-92fd-9575c6891dd5.graphml b/graph/incidents_graphml/a/a7a21920-0040-11ef-92fd-9575c6891dd5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8a0ebff6f4593f5e2241ec513e06b36b5a54286
--- /dev/null
+++ b/graph/incidents_graphml/a/a7a21920-0040-11ef-92fd-9575c6891dd5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.177
+ 100.64.67.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713746316
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7a21920-0040-11ef-92fd-9575c6891dd5
+
+
+
diff --git a/graph/incidents_graphml/a/a7a2df80-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7a2df80-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e4561ec1af3e183987438620c719cb4e0323870
--- /dev/null
+++ b/graph/incidents_graphml/a/a7a2df80-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.240
+ 100.64.12.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025641
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7a2df80-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/a/a7b293e0-0040-11ef-92fd-9575c6891dd5.graphml b/graph/incidents_graphml/a/a7b293e0-0040-11ef-92fd-9575c6891dd5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ae3a5ddac9a51d1273017b2ab7cf7b08433edc0
--- /dev/null
+++ b/graph/incidents_graphml/a/a7b293e0-0040-11ef-92fd-9575c6891dd5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.177
+ 100.64.67.177
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713746316
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7b293e0-0040-11ef-92fd-9575c6891dd5
+
+
+
diff --git a/graph/incidents_graphml/a/a7b3dab0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7b3dab0-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1353bbd8d66f4d9ab79cca6a7e7598851227c978
--- /dev/null
+++ b/graph/incidents_graphml/a/a7b3dab0-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.188
+ 100.64.19.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7b3dab0-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a7b469f0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7b469f0-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0825909239fc5ed1aff0ab91980dd61513184c8
--- /dev/null
+++ b/graph/incidents_graphml/a/a7b469f0-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.101
+ 100.64.34.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704218
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a7b469f0-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a7b9c2e0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7b9c2e0-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4631fb799415794f9abaa4c7e7be06b61f7e6fa4
--- /dev/null
+++ b/graph/incidents_graphml/a/a7b9c2e0-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.240
+ 100.64.12.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025641
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a7b9c2e0-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/a/a7bf7720-2ff5-11ee-b00f-c1ca007fb916.graphml b/graph/incidents_graphml/a/a7bf7720-2ff5-11ee-b00f-c1ca007fb916.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b41d2b66c980cec58a93e8ae933f662e6f4d3c0
--- /dev/null
+++ b/graph/incidents_graphml/a/a7bf7720-2ff5-11ee-b00f-c1ca007fb916.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.173
+ 100.64.69.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690844262
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7bf7720-2ff5-11ee-b00f-c1ca007fb916
+
+
+ INCIDENT_LINK
+ 1690844262
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7bf7720-2ff5-11ee-b00f-c1ca007fb916
+
+
+
diff --git a/graph/incidents_graphml/a/a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0bb96da5615154a228daa85545011a09fcd017cd
--- /dev/null
+++ b/graph/incidents_graphml/a/a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.229
+ 100.64.4.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704218
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7c2e8e0-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a7c40330-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7c40330-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19a72f86309b7dea7defdaf9f8542cec708e0b2b
--- /dev/null
+++ b/graph/incidents_graphml/a/a7c40330-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145706
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7c40330-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a7c84d10-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7c84d10-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8f81f9ebba53a6abda27d1d603bceb8d4c42763
--- /dev/null
+++ b/graph/incidents_graphml/a/a7c84d10-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.188
+ 100.64.19.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368511
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a7c84d10-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a7ca3da0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7ca3da0-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6d61124a1e9148168d95224ff95077bce29e14e
--- /dev/null
+++ b/graph/incidents_graphml/a/a7ca3da0-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025641
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7ca3da0-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/a/a7d25230-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7d25230-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f327ce1a046f88195e36ec5f74f7dcfc7c384a18
--- /dev/null
+++ b/graph/incidents_graphml/a/a7d25230-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.229
+ 100.64.4.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704218
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a7d25230-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a7d78b30-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7d78b30-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d59a1990909f2ebb222b3669789a6837ffa8faed
--- /dev/null
+++ b/graph/incidents_graphml/a/a7d78b30-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145706
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7d78b30-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a7d7e300-ab79-11ee-a1cb-599f1b15ded5.graphml b/graph/incidents_graphml/a/a7d7e300-ab79-11ee-a1cb-599f1b15ded5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fc1424873cf59d3eee8993bc36e86d38a8c377f
--- /dev/null
+++ b/graph/incidents_graphml/a/a7d7e300-ab79-11ee-a1cb-599f1b15ded5.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.246
+ 100.64.49.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.87
+ 100.64.23.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.247
+ 100.64.49.247
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.248
+ 100.64.49.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.74
+ 100.64.20.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.249
+ 100.64.49.249
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+ INCIDENT_LINK
+ 1704424949
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a7d7e300-ab79-11ee-a1cb-599f1b15ded5
+
+
+
diff --git a/graph/incidents_graphml/a/a7da4330-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a7da4330-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b9b659aeb92fd0608d90e3840a5de8a11ca9327
--- /dev/null
+++ b/graph/incidents_graphml/a/a7da4330-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025641
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7da4330-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/a/a7e1bb80-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7e1bb80-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc4c9437c59fe7e3bb099579d0f68d2cdd636d2e
--- /dev/null
+++ b/graph/incidents_graphml/a/a7e1bb80-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.189
+ 100.64.58.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7e1bb80-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a7e7dee0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7e7dee0-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f488c44f464ae580662f960de2c90b781a1a4c12
--- /dev/null
+++ b/graph/incidents_graphml/a/a7e7dee0-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7e7dee0-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a7ec24d0-ebe2-11ec-a061-5b442ef1448c.graphml b/graph/incidents_graphml/a/a7ec24d0-ebe2-11ec-a061-5b442ef1448c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12dae4fa4d1f3a524f56b2ea4e04272f421736a3
--- /dev/null
+++ b/graph/incidents_graphml/a/a7ec24d0-ebe2-11ec-a061-5b442ef1448c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.182
+ USER-0015-1639.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655211925
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a7ec24d0-ebe2-11ec-a061-5b442ef1448c
+
+
+
diff --git a/graph/incidents_graphml/a/a7ec9df0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a7ec9df0-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ade2d4d0927cc2201dc1b20be310046066751c46
--- /dev/null
+++ b/graph/incidents_graphml/a/a7ec9df0-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7ec9df0-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a7eef940-1d36-11ee-9ab6-a3b5d64e58f9.graphml b/graph/incidents_graphml/a/a7eef940-1d36-11ee-9ab6-a3b5d64e58f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..87d3b075a837e2f1b07c84152bf4148c3f617f4f
--- /dev/null
+++ b/graph/incidents_graphml/a/a7eef940-1d36-11ee-9ab6-a3b5d64e58f9.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.167
+ 100.64.82.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.168
+ 100.64.82.168
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.169
+ 100.64.82.169
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688783108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7eef940-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7eef940-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7eef940-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7eef940-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7eef940-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+ INCIDENT_LINK
+ 1688783108
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7eef940-1d36-11ee-9ab6-a3b5d64e58f9
+
+
+
diff --git a/graph/incidents_graphml/a/a7f124d0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a7f124d0-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c61b4a125bb843a5e96dfc071a0a042935b6266
--- /dev/null
+++ b/graph/incidents_graphml/a/a7f124d0-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.240
+ 100.64.42.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a7f124d0-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a7fa0750-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a7fa0750-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa6d2d123c30e406f86b0ed34220d16c9fa24c21
--- /dev/null
+++ b/graph/incidents_graphml/a/a7fa0750-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a7fa0750-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a7ff4560-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a7ff4560-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f68f9b877c851bd504129cb1a714e0e091b4af9
--- /dev/null
+++ b/graph/incidents_graphml/a/a7ff4560-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.157
+ 100.64.23.157
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a7ff4560-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a8006710-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a8006710-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78b1c4b48921b93b0651326b4360a0d13b335c2f
--- /dev/null
+++ b/graph/incidents_graphml/a/a8006710-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.240
+ 100.64.42.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a8006710-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a80ca4f0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a80ca4f0-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b344aff946168d9db49ee72a585f283906aef40
--- /dev/null
+++ b/graph/incidents_graphml/a/a80ca4f0-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a80ca4f0-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a80d5f60-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a80d5f60-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb5d021f79406590b8168870aab50f7066e31080
--- /dev/null
+++ b/graph/incidents_graphml/a/a80d5f60-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.191
+ 100.64.58.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a80d5f60-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a80e87a0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a80e87a0-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ead4838f7a8a64f0bb6b3dc0be3cc932df9e73b5
--- /dev/null
+++ b/graph/incidents_graphml/a/a80e87a0-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063472
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a80e87a0-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a812a910-311a-11ee-87a2-613e036775fd.graphml b/graph/incidents_graphml/a/a812a910-311a-11ee-87a2-613e036775fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a725f532a35d8170237d7d9fafffa28e86a43ce
--- /dev/null
+++ b/graph/incidents_graphml/a/a812a910-311a-11ee-87a2-613e036775fd.graphml
@@ -0,0 +1,763 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.213
+ 100.64.5.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.55
+ 100.64.13.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.218
+ 100.64.57.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.219
+ 100.64.57.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.236
+ 100.64.15.236
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.220
+ 100.64.57.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.221
+ USER-0015-1424.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.222
+ 100.64.57.222
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.217
+ 100.64.31.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.223
+ 100.64.57.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.224
+ 100.64.57.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.225
+ 100.64.57.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.226
+ 100.64.57.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.227
+ USER-0015-1425.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.24
+ 100.64.46.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.228
+ 100.64.57.228
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+ INCIDENT_LINK
+ 1690970105
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a812a910-311a-11ee-87a2-613e036775fd
+
+
+
diff --git a/graph/incidents_graphml/a/a81bde50-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a81bde50-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2e3ebe2c65eccda5e09080eadd5db1e1760e476
--- /dev/null
+++ b/graph/incidents_graphml/a/a81bde50-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.191
+ 100.64.58.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a81bde50-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a81ecd60-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a81ecd60-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adbb2f2d5c238de2606a5f8479ff7a55b2ae826d
--- /dev/null
+++ b/graph/incidents_graphml/a/a81ecd60-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a81ecd60-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a81f7790-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a81f7790-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae91b12163538db531974234a85f48b7dfbdbfef
--- /dev/null
+++ b/graph/incidents_graphml/a/a81f7790-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063472
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a81f7790-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a83050b0-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a83050b0-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d93da8529b31375554eb790beeadbdeeca56c84b
--- /dev/null
+++ b/graph/incidents_graphml/a/a83050b0-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.193
+ 100.64.58.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704219
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a83050b0-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a8311ce0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a8311ce0-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4a16bc431edb7e721e0bb5a3b4143bfc8c0af13
--- /dev/null
+++ b/graph/incidents_graphml/a/a8311ce0-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8311ce0-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a8420cd0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a8420cd0-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99e5d301d0b691096c533fb775bb5052fb70d4e5
--- /dev/null
+++ b/graph/incidents_graphml/a/a8420cd0-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8420cd0-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a8471280-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a8471280-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51e2b63f8af08cb4af7e1ae762d96618b91a0374
--- /dev/null
+++ b/graph/incidents_graphml/a/a8471280-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.198
+ 100.64.24.198
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638437
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8471280-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a8534ae0-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a8534ae0-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a25b255e01defba9e9403d7f4f8b76ca9bebcf2
--- /dev/null
+++ b/graph/incidents_graphml/a/a8534ae0-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a8534ae0-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a85c28a0-2289-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/a/a85c28a0-2289-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a543ed72f61ec16dd7f4f94bc0d664d8cdbcb9bf
--- /dev/null
+++ b/graph/incidents_graphml/a/a85c28a0-2289-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.34
+ 100.64.2.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689368512
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a85c28a0-2289-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/a/a86213c0-614d-11ee-82b9-21d9d71c2fa4.graphml b/graph/incidents_graphml/a/a86213c0-614d-11ee-82b9-21d9d71c2fa4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..295d37e0051a07921364369592e1bdff6175fee3
--- /dev/null
+++ b/graph/incidents_graphml/a/a86213c0-614d-11ee-82b9-21d9d71c2fa4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.32
+ 100.64.69.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1696269666
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a86213c0-614d-11ee-82b9-21d9d71c2fa4
+
+
+
diff --git a/graph/incidents_graphml/a/a864b000-725d-11ee-88c1-133d8406c021.graphml b/graph/incidents_graphml/a/a864b000-725d-11ee-88c1-133d8406c021.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5ac645b37694bcce8ee01ddc92d199eb62b2f98
--- /dev/null
+++ b/graph/incidents_graphml/a/a864b000-725d-11ee-88c1-133d8406c021.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.87
+ 100.64.47.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698145707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a864b000-725d-11ee-88c1-133d8406c021
+
+
+
diff --git a/graph/incidents_graphml/a/a8660fc0-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a8660fc0-21f1-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a69b1710a56c21ca7fdd6eb897318561c63415a0
--- /dev/null
+++ b/graph/incidents_graphml/a/a8660fc0-21f1-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.5
+ 100.64.96.5
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689303229
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8660fc0-21f1-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/a/a868c260-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a868c260-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c8a678abba52a020dcedcf6980c407df53a0bf4
--- /dev/null
+++ b/graph/incidents_graphml/a/a868c260-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684933100
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a868c260-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a872ca10-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a872ca10-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6538a48cdb1aefca5a9dcc7e84ded662c55de703
--- /dev/null
+++ b/graph/incidents_graphml/a/a872ca10-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.160
+ 100.64.35.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a872ca10-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a8730ac0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a8730ac0-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eba92d7bc968d3868f6bb52266db51184921df83
--- /dev/null
+++ b/graph/incidents_graphml/a/a8730ac0-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.107
+ 100.64.73.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.240
+ USER-0015-1630.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.112
+ 100.64.71.112
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.108
+ 100.64.73.108
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155530
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8730ac0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155530
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8730ac0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155530
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8730ac0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155530
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8730ac0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155530
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8730ac0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155530
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8730ac0-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/a/a8814900-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/a/a8814900-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..533b63cfc1a67938322f21d01ebb1bc0f64c7628
--- /dev/null
+++ b/graph/incidents_graphml/a/a8814900-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.160
+ 100.64.35.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548936
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a8814900-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/a/a8840070-482f-11ee-a737-6b545b426b37.graphml b/graph/incidents_graphml/a/a8840070-482f-11ee-a737-6b545b426b37.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44bb1f7061f4e12217c4bfae2e7f5c2b19de9d32
--- /dev/null
+++ b/graph/incidents_graphml/a/a8840070-482f-11ee-a737-6b545b426b37.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.216
+ 100.64.20.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.149
+ 100.64.10.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.141
+ 100.64.56.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.179
+ 100.64.31.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.207
+ 100.64.8.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.99
+ 100.64.39.99
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.192
+ 100.64.9.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+ INCIDENT_LINK
+ 1693508002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8840070-482f-11ee-a737-6b545b426b37
+
+
+
diff --git a/graph/incidents_graphml/a/a8923d80-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/a/a8923d80-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e461f570c88c958494e5990ed1ffc73583561e4f
--- /dev/null
+++ b/graph/incidents_graphml/a/a8923d80-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.73
+ 100.64.63.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893358
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8923d80-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893358
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8923d80-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/a/a89ba600-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a89ba600-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9920ab820d36c14ce608a80a391f921dfd9f45cf
--- /dev/null
+++ b/graph/incidents_graphml/a/a89ba600-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.95
+ 100.64.96.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688043945
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a89ba600-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a8a88d30-00af-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/a/a8a88d30-00af-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9255b0b1c5de1b0ef8d257e26f0ab3ac23bb9c9e
--- /dev/null
+++ b/graph/incidents_graphml/a/a8a88d30-00af-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,345 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.165
+ 100.64.18.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.170
+ USER-0015-1378.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.39
+ 100.64.19.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.171
+ 100.64.48.171
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.172
+ 100.64.48.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.60
+ 100.64.26.60
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.173
+ 100.64.48.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a88d30-00af-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/a/a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/a/a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c8b64294eb81acb9699ed0652508cfee6374019
--- /dev/null
+++ b/graph/incidents_graphml/a/a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703222
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1
+
+
+ INCIDENT_LINK
+ 1688703222
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8a8c7e0-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/a/a8af8b60-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/a/a8af8b60-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98d9162040a84faedabf6d7435b466579117b9ee
--- /dev/null
+++ b/graph/incidents_graphml/a/a8af8b60-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.32
+ 100.64.82.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.77
+ 100.64.72.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689246965
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8af8b60-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246965
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8af8b60-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/a/a8bd26a0-00af-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/a/a8bd26a0-00af-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f689f5f09319ddc6cf43436f28899800dc8cfb45
--- /dev/null
+++ b/graph/incidents_graphml/a/a8bd26a0-00af-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.160
+ 100.64.42.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.178
+ 100.64.48.178
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.179
+ 100.64.48.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.180
+ 100.64.48.180
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.181
+ 100.64.48.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.182
+ 100.64.48.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.225
+ 100.64.35.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.183
+ 100.64.48.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.187
+ 100.64.34.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.13.82
+ 100.64.13.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.146
+ 100.64.4.146
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.127
+ 100.64.17.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.184
+ 100.64.48.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.185
+ 100.64.48.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.186
+ 100.64.48.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793992
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a8bd26a0-00af-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/a/a8c25780-89a2-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/a/a8c25780-89a2-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e1e2c5e69234998a3538d33bf3275a95a09feaa
--- /dev/null
+++ b/graph/incidents_graphml/a/a8c25780-89a2-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.20
+ 100.64.19.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700704220
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8c25780-89a2-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/a/a8c5d680-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a8c5d680-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..705b7fc1b8b1d125422f623851624320e8dd9703
--- /dev/null
+++ b/graph/incidents_graphml/a/a8c5d680-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684933100
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8c5d680-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a8ce75d0-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a8ce75d0-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83dfd0bc19ba9b143d115b6971f04f85a2c70dd3
--- /dev/null
+++ b/graph/incidents_graphml/a/a8ce75d0-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.95
+ 100.64.96.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688043945
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8ce75d0-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a8dfe160-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a8dfe160-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4936e5d465dc350143405fd89b04003132cd66d
--- /dev/null
+++ b/graph/incidents_graphml/a/a8dfe160-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.161
+ 100.64.23.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063473
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a8dfe160-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a8e2dd50-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a8e2dd50-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f97618a1d1147eb436517cd099eb65dac0bc1ea
--- /dev/null
+++ b/graph/incidents_graphml/a/a8e2dd50-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.199
+ 100.64.24.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638438
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8e2dd50-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a8e852a0-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a8e852a0-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32f818ad0b0ef10a19795fe50e1f5d052cf8ee7e
--- /dev/null
+++ b/graph/incidents_graphml/a/a8e852a0-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684933100
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a8e852a0-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a8f230e0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a8f230e0-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a908c786e32f2fe429b129f06d899e142bcea409
--- /dev/null
+++ b/graph/incidents_graphml/a/a8f230e0-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.163
+ 100.64.23.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063473
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a8f230e0-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a900afd0-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a900afd0-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b3d4d77ec6d78db94c6b28b492f3ea935e6ffbe
--- /dev/null
+++ b/graph/incidents_graphml/a/a900afd0-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.163
+ 100.64.23.163
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a900afd0-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a904b440-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a904b440-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e733ca6e4314863ca50aad8ec944bc9150c47e87
--- /dev/null
+++ b/graph/incidents_graphml/a/a904b440-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.39.25
+ 100.64.39.25
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684933101
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a904b440-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a908c690-a070-11ee-8eba-81c30328b488.graphml b/graph/incidents_graphml/a/a908c690-a070-11ee-8eba-81c30328b488.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fdbb07456a1a369e9059c1c14bc493c8b5e5f336
--- /dev/null
+++ b/graph/incidents_graphml/a/a908c690-a070-11ee-8eba-81c30328b488.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.149
+ 100.64.53.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.150
+ 100.64.53.150
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.151
+ 100.64.53.151
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.152
+ 100.64.53.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+ INCIDENT_LINK
+ 1703211622
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a908c690-a070-11ee-8eba-81c30328b488
+
+
+
diff --git a/graph/incidents_graphml/a/a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/a/a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dc0155b02d331e9b0e6a59ff28b4988c4694a5e
--- /dev/null
+++ b/graph/incidents_graphml/a/a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686806995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9123f40-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/a/a919aa90-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a919aa90-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa76a5398560cad1bb70fd23ba53d75d67dc2b1f
--- /dev/null
+++ b/graph/incidents_graphml/a/a919aa90-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.166
+ 100.64.40.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473248
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a919aa90-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/a/a924f510-d4fd-11ee-b65b-9d9885766d0d.graphml b/graph/incidents_graphml/a/a924f510-d4fd-11ee-b65b-9d9885766d0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6676cee0ecfae2917e06de78153024f37308900d
--- /dev/null
+++ b/graph/incidents_graphml/a/a924f510-d4fd-11ee-b65b-9d9885766d0d.graphml
@@ -0,0 +1,633 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.189
+ 100.64.27.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.190
+ 100.64.27.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.192
+ USER-0015-1266.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.193
+ USER-0015-1267.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.254
+ 100.64.8.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.77
+ 100.64.4.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.194
+ 100.64.27.194
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.195
+ 100.64.27.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.36
+ 100.64.14.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.196
+ 100.64.27.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.197
+ 100.64.27.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.198
+ 100.64.27.198
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.11
+ 100.64.25.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.199
+ 100.64.27.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+ INCIDENT_LINK
+ 1708989642
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a924f510-d4fd-11ee-b65b-9d9885766d0d
+
+
+
diff --git a/graph/incidents_graphml/a/a925b3a0-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a925b3a0-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..322108c2a1cb515a40d5b3c45d9c14a339cea3f3
--- /dev/null
+++ b/graph/incidents_graphml/a/a925b3a0-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.184
+ 100.64.21.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1695254766
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a925b3a0-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/a/a9260460-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a9260460-21f1-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72a89d3cea74168de9387afa06c96408c3a2c691
--- /dev/null
+++ b/graph/incidents_graphml/a/a9260460-21f1-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.7
+ 100.64.96.7
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1689303230
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9260460-21f1-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/a/a9298430-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/a/a9298430-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b45968e0578f9cde6ea1ca0393ac4162767e84a
--- /dev/null
+++ b/graph/incidents_graphml/a/a9298430-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.21.184
+ 100.64.21.184
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695254766
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a9298430-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/a/a92e4400-6327-11ee-84e8-6f3a76e74a81.graphml b/graph/incidents_graphml/a/a92e4400-6327-11ee-84e8-6f3a76e74a81.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b13d6fe6b0a4ca35ab5723f84b486cb81eaa685
--- /dev/null
+++ b/graph/incidents_graphml/a/a92e4400-6327-11ee-84e8-6f3a76e74a81.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.166
+ 100.64.40.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696473248
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a92e4400-6327-11ee-84e8-6f3a76e74a81
+
+
+
diff --git a/graph/incidents_graphml/a/a92f4e80-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a92f4e80-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1334bff917c0976f78f5c4b0ecdc48fd5652359d
--- /dev/null
+++ b/graph/incidents_graphml/a/a92f4e80-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.173
+ USER-0015-1792.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.38
+ 100.64.73.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687563768
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a92f4e80-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a92f96f0-0040-11ef-92fd-9575c6891dd5.graphml b/graph/incidents_graphml/a/a92f96f0-0040-11ef-92fd-9575c6891dd5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46fc2c4c2c7d68a17f535cb8699ebaffa97dd6a7
--- /dev/null
+++ b/graph/incidents_graphml/a/a92f96f0-0040-11ef-92fd-9575c6891dd5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.242
+ 100.64.48.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713746318
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a92f96f0-0040-11ef-92fd-9575c6891dd5
+
+
+
diff --git a/graph/incidents_graphml/a/a9448430-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9448430-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dd095a02f7fce56abcc1776cbc60f40e31a01a8
--- /dev/null
+++ b/graph/incidents_graphml/a/a9448430-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.38
+ 100.64.73.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.173
+ USER-0015-1792.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687563768
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9448430-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a949b900-21f1-11ee-9fd4-59af0d5e8a32.graphml b/graph/incidents_graphml/a/a949b900-21f1-11ee-9fd4-59af0d5e8a32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c7f0cbfa6816e43998fe05a2d6097fd17fc0881
--- /dev/null
+++ b/graph/incidents_graphml/a/a949b900-21f1-11ee-9fd4-59af0d5e8a32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ USER-0015-1974.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.96.7
+ 100.64.96.7
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689303230
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a949b900-21f1-11ee-9fd4-59af0d5e8a32
+
+
+
diff --git a/graph/incidents_graphml/a/a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/a/a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3bd3ed68712ab586710ab6f9790e6f365c261baf
--- /dev/null
+++ b/graph/incidents_graphml/a/a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.46
+ 100.64.74.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656923042
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a94c82d0-fb72-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/a/a94eb840-00af-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/a/a94eb840-00af-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1af0412964cc9ed8c58a940a51fbd99a0ce16c7e
--- /dev/null
+++ b/graph/incidents_graphml/a/a94eb840-00af-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.139
+ 100.64.20.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.195
+ 100.64.48.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.196
+ 100.64.48.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.251
+ 100.64.12.251
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.197
+ 100.64.48.197
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.198
+ 100.64.48.198
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.199
+ 100.64.48.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.255
+ 100.64.8.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.236
+ 100.64.17.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.200
+ 100.64.48.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.167
+ 100.64.10.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.192
+ 100.64.5.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.144
+ 100.64.5.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.201
+ 100.64.48.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.202
+ 100.64.48.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713793993
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a94eb840-00af-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/a/a95097e0-1eb1-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/a/a95097e0-1eb1-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9de1881206564d472c46eedee5e37dd97d83f4c4
--- /dev/null
+++ b/graph/incidents_graphml/a/a95097e0-1eb1-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.188
+ 100.64.34.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.171
+ 100.64.12.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.233
+ 100.64.63.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.234
+ 100.64.63.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+ INCIDENT_LINK
+ 1688945889
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a95097e0-1eb1-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/a/a95c9840-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a95c9840-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dad6137fea62dca4d14a58499f21afd0f5c79c75
--- /dev/null
+++ b/graph/incidents_graphml/a/a95c9840-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684933101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a95c9840-fa32-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1684933101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a95c9840-fa32-11ed-af18-a9f44b259145
+
+
+ INCIDENT_LINK
+ 1684933101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a95c9840-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a9670c50-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a9670c50-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..126ea360dd6c05acd7ce2bb2fd2dd6727ef26a40
--- /dev/null
+++ b/graph/incidents_graphml/a/a9670c50-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.97
+ 100.64.96.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1688043946
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9670c50-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a96b6a80-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/a/a96b6a80-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfb0b326d5bc8a90122d754172d6fe01fadbd876
--- /dev/null
+++ b/graph/incidents_graphml/a/a96b6a80-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.242
+ 100.64.12.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025644
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a96b6a80-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/a/a9824d60-9a0f-11ee-ac12-3d0889e17739.graphml b/graph/incidents_graphml/a/a9824d60-9a0f-11ee-ac12-3d0889e17739.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d5223305eac8c60eb759114df3ceefa27c8fdd0
--- /dev/null
+++ b/graph/incidents_graphml/a/a9824d60-9a0f-11ee-ac12-3d0889e17739.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702510255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a9824d60-9a0f-11ee-ac12-3d0889e17739
+
+
+
diff --git a/graph/incidents_graphml/a/a98555f0-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a98555f0-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8ed194e2798ae3b5ba6c143ce92c6ac89820a8f
--- /dev/null
+++ b/graph/incidents_graphml/a/a98555f0-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684933101
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a98555f0-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a985e560-4424-11ee-8c3f-91b7cde7d3e6.graphml b/graph/incidents_graphml/a/a985e560-4424-11ee-8c3f-91b7cde7d3e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b4efdc0a1771cc6a7a25c55111626a3dea7c673f
--- /dev/null
+++ b/graph/incidents_graphml/a/a985e560-4424-11ee-8c3f-91b7cde7d3e6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.184
+ 100.64.15.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693063474
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a985e560-4424-11ee-8c3f-91b7cde7d3e6
+
+
+
diff --git a/graph/incidents_graphml/a/a9971100-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9971100-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b99f6d57e9aecd0c157bfc854008fbbd60492b9d
--- /dev/null
+++ b/graph/incidents_graphml/a/a9971100-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.175
+ 100.64.78.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687563769
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9971100-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a99befe0-9a0f-11ee-ac12-3d0889e17739.graphml b/graph/incidents_graphml/a/a99befe0-9a0f-11ee-ac12-3d0889e17739.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..648a49764be28d817fec3c80afdaf5936bce5da9
--- /dev/null
+++ b/graph/incidents_graphml/a/a99befe0-9a0f-11ee-ac12-3d0889e17739.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702510255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a99befe0-9a0f-11ee-ac12-3d0889e17739
+
+
+
diff --git a/graph/incidents_graphml/a/a9a82030-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a9a82030-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b47e213e755515b11e22bef2a6361db461dfe729
--- /dev/null
+++ b/graph/incidents_graphml/a/a9a82030-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684933102
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9a82030-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a9aa98e0-3ff2-11ef-ad45-01c099738c24.graphml b/graph/incidents_graphml/a/a9aa98e0-3ff2-11ef-ad45-01c099738c24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad149d1ca6dcba5d0c79ef23b94e622f114ad0be
--- /dev/null
+++ b/graph/incidents_graphml/a/a9aa98e0-3ff2-11ef-ad45-01c099738c24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.157
+ 100.64.62.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720749693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9aa98e0-3ff2-11ef-ad45-01c099738c24
+
+
+
diff --git a/graph/incidents_graphml/a/a9b82d90-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9b82d90-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a56a8af13be72b3d9dc5398dacdecacd5ba922c
--- /dev/null
+++ b/graph/incidents_graphml/a/a9b82d90-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.176
+ HOST-14983
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687563769
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9b82d90-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a9bd69b0-167d-11ee-b43f-0d674d180bfa.graphml b/graph/incidents_graphml/a/a9bd69b0-167d-11ee-b43f-0d674d180bfa.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c06ce8f612cdec970b5ea863bbf62317cd7e677a
--- /dev/null
+++ b/graph/incidents_graphml/a/a9bd69b0-167d-11ee-b43f-0d674d180bfa.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.97
+ 100.64.96.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688043947
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bd69b0-167d-11ee-b43f-0d674d180bfa
+
+
+
diff --git a/graph/incidents_graphml/a/a9bdc3d0-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/a/a9bdc3d0-a33a-11ed-a505-7f4e35fde98f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb0e6ba8412df8343f12afa46072ca5638cff47d
--- /dev/null
+++ b/graph/incidents_graphml/a/a9bdc3d0-a33a-11ed-a505-7f4e35fde98f.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.31
+ 100.64.75.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.76.246
+ 100.64.76.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.16.179
+ 100.64.16.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.75
+ 100.64.73.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.181
+ 100.64.78.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.4.229
+ 100.64.4.229
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.182
+ 100.64.78.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9bdc3d0-a33a-11ed-a505-7f4e35fde98f
+
+
+
diff --git a/graph/incidents_graphml/a/a9bf0840-9a0f-11ee-ac12-3d0889e17739.graphml b/graph/incidents_graphml/a/a9bf0840-9a0f-11ee-ac12-3d0889e17739.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..161186eebfa854e64e7a7f932f94adfba2c793a4
--- /dev/null
+++ b/graph/incidents_graphml/a/a9bf0840-9a0f-11ee-ac12-3d0889e17739.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.140
+ 100.64.26.140
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702510255
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a9bf0840-9a0f-11ee-ac12-3d0889e17739
+
+
+
diff --git a/graph/incidents_graphml/a/a9c0d110-a33a-11ed-a505-7f4e35fde98f.graphml b/graph/incidents_graphml/a/a9c0d110-a33a-11ed-a505-7f4e35fde98f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15f97eaba3d97764a869648e011e11aa9d38b826
--- /dev/null
+++ b/graph/incidents_graphml/a/a9c0d110-a33a-11ed-a505-7f4e35fde98f.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.183
+ 100.64.78.183
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.147
+ 100.64.72.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9c0d110-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9c0d110-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9c0d110-a33a-11ed-a505-7f4e35fde98f
+
+
+ INCIDENT_LINK
+ 1675370786
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9c0d110-a33a-11ed-a505-7f4e35fde98f
+
+
+
diff --git a/graph/incidents_graphml/a/a9c6a4b0-fa32-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/a/a9c6a4b0-fa32-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..294d962c0017f7ea21c10216888fa3f49a00369c
--- /dev/null
+++ b/graph/incidents_graphml/a/a9c6a4b0-fa32-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.27
+ 100.64.39.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684933102
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9c6a4b0-fa32-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/a/a9c71eb0-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a9c71eb0-14b1-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..759c426ea5cfd0e2a2dd6b98c64fa1829a509e37
--- /dev/null
+++ b/graph/incidents_graphml/a/a9c71eb0-14b1-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.125
+ 100.64.42.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.176
+ 100.64.72.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687846378
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9c71eb0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846378
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9c71eb0-14b1-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/a/a9c81b30-089f-11ee-93d6-d5b5411f7922.graphml b/graph/incidents_graphml/a/a9c81b30-089f-11ee-93d6-d5b5411f7922.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c8a61a37eeafc2206bf2f3cc8a5a4281364d3ab
--- /dev/null
+++ b/graph/incidents_graphml/a/a9c81b30-089f-11ee-93d6-d5b5411f7922.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.73
+ 100.64.27.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686519233
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9c81b30-089f-11ee-93d6-d5b5411f7922
+
+
+
diff --git a/graph/incidents_graphml/a/a9cee9e0-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9cee9e0-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e504979b525aba85d174ad12c2076191a002de2
--- /dev/null
+++ b/graph/incidents_graphml/a/a9cee9e0-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.176
+ HOST-14983
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687563769
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9cee9e0-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a9d44f10-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/a/a9d44f10-9773-11ed-8e25-218966643970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..74a0fb7cd9ea6dad8592096d4b21bbaec795d6a3
--- /dev/null
+++ b/graph/incidents_graphml/a/a9d44f10-9773-11ed-8e25-218966643970.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ HOST-15875
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.251
+ 100.64.81.251
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1674075854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9d44f10-9773-11ed-8e25-218966643970
+
+
+ INCIDENT_LINK
+ 1674075854
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9d44f10-9773-11ed-8e25-218966643970
+
+
+
diff --git a/graph/incidents_graphml/a/a9d6e720-9773-11ed-8e25-218966643970.graphml b/graph/incidents_graphml/a/a9d6e720-9773-11ed-8e25-218966643970.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2eb36242542c5bbd6645122ae51af7b6c9be09c8
--- /dev/null
+++ b/graph/incidents_graphml/a/a9d6e720-9773-11ed-8e25-218966643970.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.44
+ HOST-16169
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1674075854
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9d6e720-9773-11ed-8e25-218966643970
+
+
+ INCIDENT_LINK
+ 1674075854
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9d6e720-9773-11ed-8e25-218966643970
+
+
+
diff --git a/graph/incidents_graphml/a/a9d894f0-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/a/a9d894f0-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35c298137de1b319a7bd9344f31ff36fa36def18
--- /dev/null
+++ b/graph/incidents_graphml/a/a9d894f0-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146278
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a9d894f0-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/a/a9d92010-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a9d92010-14b1-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2924e1985df5eacffe8c0ef92e6297b39851715
--- /dev/null
+++ b/graph/incidents_graphml/a/a9d92010-14b1-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.139
+ 100.64.79.139
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.101
+ 100.64.71.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687846378
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9d92010-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846378
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9d92010-14b1-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/a/a9d922f0-3ff2-11ef-ad45-01c099738c24.graphml b/graph/incidents_graphml/a/a9d922f0-3ff2-11ef-ad45-01c099738c24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b48613a983fae9565ddabbbc6581e4a7a7200c3
--- /dev/null
+++ b/graph/incidents_graphml/a/a9d922f0-3ff2-11ef-ad45-01c099738c24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.163
+ 100.64.88.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1720749693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9d922f0-3ff2-11ef-ad45-01c099738c24
+
+
+
diff --git a/graph/incidents_graphml/a/a9da14d0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9da14d0-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2538f45f2f4e495e4eb5964f89d0701c5bfcb66f
--- /dev/null
+++ b/graph/incidents_graphml/a/a9da14d0-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.109
+ 100.64.73.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9da14d0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9da14d0-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/a/a9dfe130-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9dfe130-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d155bd74c57a8ba9b23b7d4f2da6cb45c1e936c5
--- /dev/null
+++ b/graph/incidents_graphml/a/a9dfe130-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.127
+ 100.64.27.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.160
+ USER-0015-1654.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9dfe130-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9dfe130-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/a/a9e000e0-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9e000e0-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09e1c6e867a8ace6d45c17f400f1c671b9580ada
--- /dev/null
+++ b/graph/incidents_graphml/a/a9e000e0-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.180
+ 100.64.78.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.30
+ 100.64.74.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687563769
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9e000e0-121f-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687563769
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a9e000e0-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26.graphml b/graph/incidents_graphml/a/a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..174825834e5c8603f81aa5d5a284a337afa00554
--- /dev/null
+++ b/graph/incidents_graphml/a/a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.140
+ 100.64.79.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.115
+ 100.64.72.115
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687846378
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+ INCIDENT_LINK
+ 1687846378
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9e9c1e0-14b1-11ee-abc8-e11acc1bcb26
+
+
+
diff --git a/graph/incidents_graphml/a/a9ea8f90-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9ea8f90-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ad350e25b4b77345e1812f56ff94a10c73469da
--- /dev/null
+++ b/graph/incidents_graphml/a/a9ea8f90-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.85
+ 100.64.71.85
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.111
+ 100.64.73.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.112
+ 100.64.73.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9ea8f90-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/a/a9eea6e0-121f-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/a/a9eea6e0-121f-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdc2d0497e6aaeb3b60e0fe0ecef78c226be89f8
--- /dev/null
+++ b/graph/incidents_graphml/a/a9eea6e0-121f-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.55
+ 100.64.71.55
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687563770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9eea6e0-121f-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/a/a9ef98a0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/a/a9ef98a0-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf689e09c4569af95ba8c443106f7fcfb2fb6cb0
--- /dev/null
+++ b/graph/incidents_graphml/a/a9ef98a0-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,475 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.231
+ USER-0015-1655.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.113
+ 100.64.73.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.114
+ USER-0015-1656.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.115
+ USER-0015-1657.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.116
+ USER-0015-1658.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.117
+ 100.64.73.117
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.5
+ USER-0015-1659.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.118
+ 100.64.73.118
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.119
+ USER-0015-1660.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.120
+ USER-0015-1661.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.121
+ USER-0015-1662.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.122
+ 100.64.73.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.123
+ 100.64.73.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.124
+ USER-0015-1663.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155533
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a9ef98a0-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/a/a9fc6a70-45d0-11ee-95ea-81d84bb304b3.graphml b/graph/incidents_graphml/a/a9fc6a70-45d0-11ee-95ea-81d84bb304b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd0e51e2f181300d523903138301b3e20d3e2a95
--- /dev/null
+++ b/graph/incidents_graphml/a/a9fc6a70-45d0-11ee-95ea-81d84bb304b3.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.41
+ USER-0015-1527.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.162
+ 100.64.69.162
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.62.242
+ USER-0015-1521.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+ INCIDENT_LINK
+ 1693247300
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a9fc6a70-45d0-11ee-95ea-81d84bb304b3
+
+
+
diff --git a/graph/incidents_graphml/a/aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/a/aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1964b607f6c19e989df8de529c6a19bffa77f556
--- /dev/null
+++ b/graph/incidents_graphml/a/aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.99
+ 100.64.69.99
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.95
+ 100.64.69.95
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1687989401
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989401
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989401
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989401
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ aa0b0730-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+
diff --git a/graph/incidents_graphml/a/aa206da0-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa206da0-6c66-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d09ef671856a9737561793248f913a252b51b71
--- /dev/null
+++ b/graph/incidents_graphml/a/aa206da0-6c66-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.161
+ 100.64.62.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697489869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ aa206da0-6c66-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/a/aa269330-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/a/aa269330-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..548e7f9de6e1f3b7b84c6aa1e01936b60269b9a4
--- /dev/null
+++ b/graph/incidents_graphml/a/aa269330-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.77
+ 100.64.4.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.158
+ 100.64.49.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.6
+ 100.64.4.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.159
+ USER-0015-1382.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.171
+ 100.64.20.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa269330-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/a/aa2f3ab0-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa2f3ab0-6c66-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cca062c372aae4a08fb6342e99a02eeb6e63226
--- /dev/null
+++ b/graph/incidents_graphml/a/aa2f3ab0-6c66-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.161
+ 100.64.62.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697489869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa2f3ab0-6c66-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/a/aa3ecb10-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa3ecb10-6c66-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec15a7d2c9265ae766b59bfd2383f6a0a8b4b61f
--- /dev/null
+++ b/graph/incidents_graphml/a/aa3ecb10-6c66-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.163
+ 100.64.62.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697489869
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ aa3ecb10-6c66-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/a/aa4f1ec0-6c66-11ee-9911-f50eb88c1287.graphml b/graph/incidents_graphml/a/aa4f1ec0-6c66-11ee-9911-f50eb88c1287.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..792e8247d27957d9a96362174e059eb2dd9bcb1f
--- /dev/null
+++ b/graph/incidents_graphml/a/aa4f1ec0-6c66-11ee-9911-f50eb88c1287.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.163
+ 100.64.62.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697489869
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa4f1ec0-6c66-11ee-9911-f50eb88c1287
+
+
+
diff --git a/graph/incidents_graphml/a/aa58aea0-2422-11ed-a6b6-abac9032d22a.graphml b/graph/incidents_graphml/a/aa58aea0-2422-11ed-a6b6-abac9032d22a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e350857c04f12b97d0296d30f9268ff617201b27
--- /dev/null
+++ b/graph/incidents_graphml/a/aa58aea0-2422-11ed-a6b6-abac9032d22a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.9.157
+ 100.64.9.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661396682
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ aa58aea0-2422-11ed-a6b6-abac9032d22a
+
+
+