diff --git a/graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88da57093cef1df7a49f6947eaa156687ec263b6
--- /dev/null
+++ b/graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.99
+ 100.64.80.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661949572
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f649e7f0-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ff8f1dbc017c9e99e8701d1aae203f76598405d
--- /dev/null
+++ b/graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.42
+ 100.64.64.42
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136784
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6577500-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43fbed7bb3b0e931d48ea6e1eb15b3d55b5b39bb
--- /dev/null
+++ b/graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.193
+ 100.64.37.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718075775
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f65b8ba0-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7e36398b21f4cc8ed58f13ca544d74db9cdc3cc2
--- /dev/null
+++ b/graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.55
+ 100.64.8.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.27
+ 100.64.40.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710927661
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f66ee220-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927661
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f66ee220-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927661
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f66ee220-e69d-11ee-8f7e-8d09b3cead02
+
+
+ INCIDENT_LINK
+ 1710927661
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f66ee220-e69d-11ee-8f7e-8d09b3cead02
+
+
+
diff --git a/graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aebc4f00f03dfc2ff590e4790ccb209c7b4fec33
--- /dev/null
+++ b/graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.215
+ 100.64.21.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435749
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6750ce0-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42467c6a5cc44a2439969a55066aa9a6848af099
--- /dev/null
+++ b/graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1682629839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ f67ef850-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbb85bd8bac182ee7ba69adca93cf62969475a1a
--- /dev/null
+++ b/graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.28.1
+ 100.64.28.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1682629839
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ f682c8e0-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00f1b3d36b22ad8f9e7b46e22708060003d50019
--- /dev/null
+++ b/graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701624332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f682da10-9200-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58d1bbe4bf85ab6740a6dd14f066804781205a35
--- /dev/null
+++ b/graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.77
+ 100.64.41.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435749
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f685fcd0-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59a641c90445421e2459a5e3341bb9e712ecb755
--- /dev/null
+++ b/graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.16
+ 100.64.30.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239303
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f68f2b60-6106-11ee-bc15-ebbbf2eb09b5
+
+
+ INCIDENT_LINK
+ 1696239303
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f68f2b60-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4564e9fd6a4127bc32566ebba7fccc63d460ded2
--- /dev/null
+++ b/graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1688147584
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6902fb0-176e-11ee-a7dc-57e99513cc0a
+
+
+
diff --git a/graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9c43ac351649bc8e72cfcd5f3e249aa0e75f3f4
--- /dev/null
+++ b/graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.72
+ 100.64.15.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701624333
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f69131f0-9200-11ee-ac87-cff3005068fb
+
+
+
diff --git a/graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3580fea2c26d5aff53c9b954db5ffc10be83c771
--- /dev/null
+++ b/graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.184
+ 100.64.15.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178148
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6937ed0-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bde0a878fbbdfc95593928f7e2d5886983d8f322
--- /dev/null
+++ b/graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.77
+ 100.64.41.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435749
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6956620-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c749a002a0f67e87590e27850641d664dfa10b4
--- /dev/null
+++ b/graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1688147584
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f697a9c0-176e-11ee-a7dc-57e99513cc0a
+
+
+
diff --git a/graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4561f9015e3b6c3ae7aa22566c6dfc61abccfe31
--- /dev/null
+++ b/graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.101
+ 100.64.11.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355170
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f69bdf10-8675-11ee-823e-1956338371c0
+
+
+ INCIDENT_LINK
+ 1700355170
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f69bdf10-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c274a7077351cb0ac99f6c7c0ad43ee46f4f0f0e
--- /dev/null
+++ b/graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.16
+ 100.64.30.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239303
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f69e4690-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9284e23ca2900cc7464d86155124bbd8ad1bd140
--- /dev/null
+++ b/graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ HOST
+ 100.64.68.119
+ 100.64.68.119
+ ["Exploiting Host","Ransomware Target","Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1682629840
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Disrupted
+ f6a2fb10-e53f-11ed-b729-bb6ecc5516ca
+
+
+
diff --git a/graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e827dbe2c0130045b9ec862e40aaccba951e3e6b
--- /dev/null
+++ b/graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.165
+ 100.64.52.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml b/graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dd223a1cc35ed8ea5f47ec1b50277fcc2a7490b
--- /dev/null
+++ b/graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.151
+ 100.64.29.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.17
+ 100.64.44.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.221
+ 100.64.56.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.56.222
+ 100.64.56.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+ INCIDENT_LINK
+ 1715835091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6a87fc0-133f-11ef-90d6-79b9e3bf2217
+
+
+
diff --git a/graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24edae7c0eef9b4edeeaa89ecd7a15637ba5b8a7
--- /dev/null
+++ b/graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.44
+ 100.64.64.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6a98ca0-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..164ef44d44a0900110a7eacbdecd8f02b1c8d56c
--- /dev/null
+++ b/graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153008
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84a6ca9059203440642c0d0d2b767fb8e2f3b245
--- /dev/null
+++ b/graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.101
+ 100.64.11.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355170
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6ab6f70-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47bb79e6e044a464a671ae61a704ad10f0111742
--- /dev/null
+++ b/graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.17
+ 100.64.24.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178148
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b76623c78b6d0505d14b31d6edf53b1a8ad2aac
--- /dev/null
+++ b/graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.165
+ 100.64.52.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..335889c99300c9092860a4e1d2fb564039704104
--- /dev/null
+++ b/graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.226
+ 100.64.92.226
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676275436
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6b81a90-ab74-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e77a4cd3e34645c5dc97bdfabc618503f7bb04f2
--- /dev/null
+++ b/graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.44
+ 100.64.64.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6b880c0-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ba388f8f4573930cad5e404e8c74692b936b996
--- /dev/null
+++ b/graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..325ed59c523976decadfe6ca273025288cc18d66
--- /dev/null
+++ b/graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.44
+ 100.64.10.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.150
+ 100.64.15.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.98
+ 100.64.41.98
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.191
+ 100.64.9.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.199
+ 100.64.10.199
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.75
+ 100.64.23.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168803
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6ba4bc0-a00c-11ee-a147-6d5e36330663
+
+
+
diff --git a/graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..004bc426848ad096cb093fdb91308fc20745d0b8
--- /dev/null
+++ b/graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.226
+ 100.64.92.226
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676275436
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6bcae70-ab74-11ed-b288-05f5e2790b36
+
+
+
diff --git a/graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69b9a53b05048348544c4628e3f05f499afd24a0
--- /dev/null
+++ b/graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.149
+ USER-0015-1235.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687182935
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff
+
+
+
diff --git a/graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..165ed21f98b7ccdb0de7cc2a69342236036ab2bb
--- /dev/null
+++ b/graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.229
+ USER-0015-1209.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375349
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6c3e2e0-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c711179881a1a2d2528de94ef43823f9424df56
--- /dev/null
+++ b/graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.167
+ 100.64.52.167
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c87009397bee86409241b577f9d5dfbd5f65419f
--- /dev/null
+++ b/graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.164
+ 100.64.80.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.133
+ 100.64.72.133
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6c883c0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6c883c0-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a90b4f121e726933801d2208e95ccc5e0065b0e8
--- /dev/null
+++ b/graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.92
+ USER-0015-1614.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6d220b0-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f6d220b0-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb470f333c5ca6dc8cc63b49139caf2e7d1a6b54
--- /dev/null
+++ b/graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.167
+ 100.64.52.167
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfec3664e28404729b83f922b411f055ed4c822d
--- /dev/null
+++ b/graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.156
+ 100.64.68.156
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1677318683
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6d8e140-b4f1-11ed-9d28-d755eb33fc3e
+
+
+
diff --git a/graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..559a4324387ada45ee5c79330ddb7485ffe49863
--- /dev/null
+++ b/graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.61
+ 100.64.76.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645669
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6d925a0-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6764437e86bf26d036f488596b8f559265055a83
--- /dev/null
+++ b/graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.229
+ USER-0015-1209.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6e06b90-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..128fb6aa4492a3d92e38361d92bf6d951e676d65
--- /dev/null
+++ b/graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.165
+ 100.64.52.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b4afbea5598df7c5d058543366d5b409d2db18b
--- /dev/null
+++ b/graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.104
+ 100.64.14.104
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675055236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6f45830-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc452e5ec2cc5435b1d167c039fb336c98cf53ac
--- /dev/null
+++ b/graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.165
+ 100.64.52.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6761ae6cff9562c8c8ca831550117382df7a0e68
--- /dev/null
+++ b/graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.113
+ 100.64.71.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667242261
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6f65a00-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242261
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6f65a00-594c-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df82b27312726764b07e4ad415383ecdceffd818
--- /dev/null
+++ b/graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,819 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.163
+ 100.64.22.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.240
+ 100.64.8.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.164
+ 100.64.22.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.165
+ 100.64.22.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.166
+ 100.64.22.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.167
+ 100.64.22.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.168
+ 100.64.22.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.152
+ 100.64.10.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.224
+ 100.64.17.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.179
+ 100.64.12.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.170
+ 100.64.22.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.171
+ 100.64.22.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.172
+ 100.64.22.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.173
+ 100.64.22.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.174
+ 100.64.22.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.235
+ 100.64.10.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f6f8d200-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e4b0aaaad60ad67bfa3cd9e1a74fbefbf74b33e
--- /dev/null
+++ b/graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.61
+ 100.64.76.61
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645669
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fade70-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bdef03bc890bcfa0e68e3614be38b1247857c52
--- /dev/null
+++ b/graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.171.187.67
+ 10.171.187.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","PAN NGFW","Vulnerability Management"]
+
+
+ HOST
+ 100.64.70.124
+ 100.64.70.124
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.125
+ 100.64.70.125
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.126
+ 100.64.70.126
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712773209
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fbdc50-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773209
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fbdc50-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773209
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fbdc50-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773209
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fbdc50-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773209
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fbdc50-f766-11ee-a32a-474576cc2660
+
+
+ INCIDENT_LINK
+ 1712773209
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f6fbdc50-f766-11ee-a32a-474576cc2660
+
+
+
diff --git a/graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..493663773b9899862fdb970a3a98243450b021bb
--- /dev/null
+++ b/graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.238
+ 100.64.85.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661949573
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f6fee010-2929-11ed-82c2-3385aead5ab0
+
+
+
diff --git a/graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..828cc604ef3043adc5d041733a2aa4f11df3a8e2
--- /dev/null
+++ b/graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.104
+ 100.64.14.104
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675055236
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7003f10-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb5357c3ab3e26f217802598632fac3c5b8e46d0
--- /dev/null
+++ b/graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7024110-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7024110-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c17d440b818ac137bf91188b3283d1b1c4e2ed96
--- /dev/null
+++ b/graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.129
+ 100.64.52.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947620
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf670-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/f70bf7f0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f70bf7f0-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58ea3f6929fcd3b5ed47c200d4baec52630c9235
--- /dev/null
+++ b/graph/incidents_graphml/f/f70bf7f0-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,367 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.215
+ 100.64.54.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.46
+ 100.64.64.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.138
+ 100.64.21.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.63
+ 100.64.38.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.47
+ 100.64.64.47
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.48
+ 100.64.64.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.99
+ 100.64.29.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f70bf7f0-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f712e9b0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f712e9b0-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..561dfdc50bdcf5e3586964299c4c318eeb445230
--- /dev/null
+++ b/graph/incidents_graphml/f/f712e9b0-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.187
+ 100.64.22.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f712e9b0-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c18b447723d5ccd16138ed127038085677f0d755
--- /dev/null
+++ b/graph/incidents_graphml/f/f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.63
+ 100.64.27.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f71e6e80-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f71e6e80-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5a8c149d0141309f98916714879e2ae8ec13282
--- /dev/null
+++ b/graph/incidents_graphml/f/f71e6e80-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136785
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f71e6e80-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f720cc60-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f720cc60-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ef191786701671d76b57b398b20aae34a0aaa7c
--- /dev/null
+++ b/graph/incidents_graphml/f/f720cc60-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.187
+ 100.64.22.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f720cc60-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f720fd80-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f720fd80-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..088891424f0f3835548d6c50e235b75381d2258e
--- /dev/null
+++ b/graph/incidents_graphml/f/f720fd80-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f720fd80-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f7249240-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7249240-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b35aba921d93d21ef1f3a9038573de341d5c4c70
--- /dev/null
+++ b/graph/incidents_graphml/f/f7249240-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.91
+ 100.64.27.91
+ ["Exploiting Host"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388831
+ malicious
+ 0.7525
+ 0.7525
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7249240-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f727d3a0-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f727d3a0-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8fd28a62e4a5ddaed2934f8edcd132f22f38395
--- /dev/null
+++ b/graph/incidents_graphml/f/f727d3a0-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.63
+ 100.64.17.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476164
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f727d3a0-06e3-11ef-a25f-979d2687f044
+
+
+ INCIDENT_LINK
+ 1714476164
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f727d3a0-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9007d1357dc95848c201bda568a5fb202b3228e
--- /dev/null
+++ b/graph/incidents_graphml/f/f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.167
+ 100.64.41.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980746
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f72debc0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f72debc0-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35743a2a0d2dc7b0e14db48e9a8800d51ddb8d2a
--- /dev/null
+++ b/graph/incidents_graphml/f/f72debc0-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.189
+ 100.64.22.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153009
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f72debc0-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f7384530-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f7384530-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fff16cfd4ea0c3db5f65227ca34393645cbaf6a2
--- /dev/null
+++ b/graph/incidents_graphml/f/f7384530-5eac-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.167
+ 100.64.41.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695980747
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7384530-5eac-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/f/f73bb800-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f73bb800-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a9850f3c4d17a74b07df1690bdcc45a938551ed
--- /dev/null
+++ b/graph/incidents_graphml/f/f73bb800-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.64
+ 100.64.76.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f73bb800-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f73dc890-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f73dc890-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df676fd63886d1155dbc76d77748069bb1a2ec4d
--- /dev/null
+++ b/graph/incidents_graphml/f/f73dc890-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178149
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f73dc890-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f7482ce0-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f7482ce0-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..544374120400fef7683a8083583ec6d447798377
--- /dev/null
+++ b/graph/incidents_graphml/f/f7482ce0-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.65
+ 100.64.17.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476164
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7482ce0-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/f74a90d0-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f74a90d0-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..012b85c6c360da7222caf5dba6f5bf2d6f9f2b2b
--- /dev/null
+++ b/graph/incidents_graphml/f/f74a90d0-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.63
+ 100.64.5.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388831
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f74a90d0-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f74e1c40-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f74e1c40-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f84846209ecfc867562c5f239b0af916c958f9ec
--- /dev/null
+++ b/graph/incidents_graphml/f/f74e1c40-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.161
+ 100.64.32.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178149
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f74e1c40-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f75150f0-66fb-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/f/f75150f0-66fb-11ee-869c-79758109a47c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad127311d49ce0fdeb37d6d2c58a60d079dfd344
--- /dev/null
+++ b/graph/incidents_graphml/f/f75150f0-66fb-11ee-869c-79758109a47c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.25.7
+ 100.64.25.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696894286
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f75150f0-66fb-11ee-869c-79758109a47c
+
+
+
diff --git a/graph/incidents_graphml/f/f752e2f0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f752e2f0-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..232970964b8d9d3671e2126466a58277b33c09e1
--- /dev/null
+++ b/graph/incidents_graphml/f/f752e2f0-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.185
+ 100.64.12.185
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700085
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f752e2f0-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f7585980-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f7585980-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..195921429a6d1bd30fba7b1dab18006a7666880d
--- /dev/null
+++ b/graph/incidents_graphml/f/f7585980-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.65
+ 100.64.17.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476164
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7585980-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/f75c10c0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f75c10c0-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76f21a15d46e133d5de94a8b8e0efe0608d671df
--- /dev/null
+++ b/graph/incidents_graphml/f/f75c10c0-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.123
+ 100.64.7.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f75c10c0-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/f760cc30-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f760cc30-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cdad96349064142cbd48399adecf21d4aaddd61
--- /dev/null
+++ b/graph/incidents_graphml/f/f760cc30-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.64
+ 100.64.76.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689645670
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f760cc30-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f76387f0-0a0a-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/f76387f0-0a0a-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bafa417322f39c5ed3d92d4adc65c56430c22989
--- /dev/null
+++ b/graph/incidents_graphml/f/f76387f0-0a0a-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.219
+ 100.64.71.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.24.214
+ HOST-2906
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675271
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f76387f0-0a0a-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675271
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f76387f0-0a0a-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/f/f766d870-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f766d870-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec3b656eb21e78430e9e6ef433730d87ccb426c1
--- /dev/null
+++ b/graph/incidents_graphml/f/f766d870-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.67
+ 100.64.17.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f766d870-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/f76a6290-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f76a6290-2ea5-11ee-a61f-7552bb17f553.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6463d0755ec038ebe716846270c76e638cf8bbee
--- /dev/null
+++ b/graph/incidents_graphml/f/f76a6290-2ea5-11ee-a61f-7552bb17f553.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.185
+ 100.64.12.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690700085
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f76a6290-2ea5-11ee-a61f-7552bb17f553
+
+
+
diff --git a/graph/incidents_graphml/f/f76c8b80-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f76c8b80-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..929932a030cfef2c941096d094812ed75d9f29f8
--- /dev/null
+++ b/graph/incidents_graphml/f/f76c8b80-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.123
+ 100.64.7.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f76c8b80-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/f76f56e0-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f76f56e0-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c697775cd932c5d916a19d6e328d2885ca64118
--- /dev/null
+++ b/graph/incidents_graphml/f/f76f56e0-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.63
+ 100.64.5.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388831
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f76f56e0-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f770ec40-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f770ec40-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f60da078ab8e3040d5369cfbdfd00dbf7acdd37
--- /dev/null
+++ b/graph/incidents_graphml/f/f770ec40-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.171
+ 100.64.30.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465850
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f770ec40-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/f774fcb0-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f774fcb0-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c8e9a8404735364747511f312163d92e6845469
--- /dev/null
+++ b/graph/incidents_graphml/f/f774fcb0-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.127
+ 100.64.50.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452799
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f774fcb0-7e40-11ee-a30b-3ba0d2ef4424
+
+
+ INCIDENT_LINK
+ 1699452799
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f774fcb0-7e40-11ee-a30b-3ba0d2ef4424
+
+
+ INCIDENT_LINK
+ 1699452799
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f774fcb0-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f77506e0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f77506e0-7b86-11ee-bc5d-534fc2a19f5f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce17f6a367c77027ca3cee6a0fee7ec4d870903b
--- /dev/null
+++ b/graph/incidents_graphml/f/f77506e0-7b86-11ee-bc5d-534fc2a19f5f.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.191
+ 100.64.22.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699153010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f77506e0-7b86-11ee-bc5d-534fc2a19f5f
+
+
+ INCIDENT_LINK
+ 1699153010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f77506e0-7b86-11ee-bc5d-534fc2a19f5f
+
+
+
diff --git a/graph/incidents_graphml/f/f776c020-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f776c020-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ec891f11b19c32f705398d4dce0b68387a422dc
--- /dev/null
+++ b/graph/incidents_graphml/f/f776c020-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812391
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f776c020-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f7781d80-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f7781d80-a00c-11ee-a147-6d5e36330663.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b11de29eaabdacb80a6506cb0de5b402c4b0dec
--- /dev/null
+++ b/graph/incidents_graphml/f/f7781d80-a00c-11ee-a147-6d5e36330663.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.100
+ 100.64.41.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.101
+ 100.64.41.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.221
+ 100.64.26.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.102
+ 100.64.41.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.103
+ 100.64.41.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.104
+ 100.64.41.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+ INCIDENT_LINK
+ 1703168804
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7781d80-a00c-11ee-a147-6d5e36330663
+
+
+
diff --git a/graph/incidents_graphml/f/f77ae360-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f77ae360-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..235afef474927767729c221c2515f02226566ef4
--- /dev/null
+++ b/graph/incidents_graphml/f/f77ae360-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,491 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.125
+ 100.64.7.125
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.126
+ 100.64.7.126
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.127
+ 100.64.7.127
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.129
+ 100.64.7.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.130
+ 100.64.7.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.132
+ 100.64.7.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.133
+ 100.64.7.133
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.134
+ 100.64.7.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882524
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f77ae360-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/f7813ff0-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f7813ff0-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6a15c877dfd5e7837a1e5f82eb14aa15eff2032
--- /dev/null
+++ b/graph/incidents_graphml/f/f7813ff0-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.171
+ 100.64.30.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465850
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7813ff0-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/f782ebf0-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f782ebf0-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4279eadbd75926002958740f84620641fb82078d
--- /dev/null
+++ b/graph/incidents_graphml/f/f782ebf0-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.69
+ 100.64.17.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f782ebf0-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/f78417e0-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f78417e0-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..204a90cbe5b9df4446f0f3428ccebd6515fd6036
--- /dev/null
+++ b/graph/incidents_graphml/f/f78417e0-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.127
+ 100.64.50.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452799
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f78417e0-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f78abd50-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f78abd50-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c637adda5f548e14d7a93da5a0ea63e2954a728d
--- /dev/null
+++ b/graph/incidents_graphml/f/f78abd50-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812391
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f78abd50-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f78bfc80-ece0-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/f/f78bfc80-ece0-11ee-ac0b-e5fde63aeb72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a291a243c0897f2e482c6e1390c08c48fdd2ad25
--- /dev/null
+++ b/graph/incidents_graphml/f/f78bfc80-ece0-11ee-ac0b-e5fde63aeb72.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.177
+ 100.64.26.177
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.36.138
+ USER-0015-1510.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.215
+ 100.64.68.215
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1711616146
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f78bfc80-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616146
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f78bfc80-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616146
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f78bfc80-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616146
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f78bfc80-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616146
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f78bfc80-ece0-11ee-ac0b-e5fde63aeb72
+
+
+ INCIDENT_LINK
+ 1711616146
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f78bfc80-ece0-11ee-ac0b-e5fde63aeb72
+
+
+
diff --git a/graph/incidents_graphml/f/f78f49a0-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f78f49a0-9b17-11ee-a7a5-af0e8425a262.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbd58e6564b65519a51c629eb0efdcc5d74e285b
--- /dev/null
+++ b/graph/incidents_graphml/f/f78f49a0-9b17-11ee-a7a5-af0e8425a262.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.145
+ 100.64.31.145
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702623773
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f78f49a0-9b17-11ee-a7a5-af0e8425a262
+
+
+
diff --git a/graph/incidents_graphml/f/f792f180-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f792f180-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cd351f5e788143037db48bc3b320ce4ae3b1a685
--- /dev/null
+++ b/graph/incidents_graphml/f/f792f180-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.69
+ 100.64.17.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f792f180-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/f7970760-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/f/f7970760-0bf4-11ee-9b02-ffb3de173f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2824589629f29a216450a33e0686424ed54b7d63
--- /dev/null
+++ b/graph/incidents_graphml/f/f7970760-0bf4-11ee-9b02-ffb3de173f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.90
+ 100.64.21.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.246
+ 100.64.76.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686885724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7970760-0bf4-11ee-9b02-ffb3de173f5d
+
+
+ INCIDENT_LINK
+ 1686885724
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7970760-0bf4-11ee-9b02-ffb3de173f5d
+
+
+
diff --git a/graph/incidents_graphml/f/f79ae920-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/f79ae920-a79e-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8813a345221c113e3eb851a6251d599c5dd8c60d
--- /dev/null
+++ b/graph/incidents_graphml/f/f79ae920-a79e-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.68
+ 100.64.8.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.144
+ 100.64.10.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.145
+ 100.64.10.145
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.146
+ 100.64.10.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.147
+ 100.64.10.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.149
+ 100.64.8.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.148
+ 100.64.10.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.149
+ 100.64.10.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.150
+ 100.64.10.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.151
+ 100.64.10.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001169
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f79ae920-a79e-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/f/f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06d3d20f999944c9e2e5506c53ee5cff4f33d4cf
--- /dev/null
+++ b/graph/incidents_graphml/f/f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.199
+ 100.64.10.199
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472992
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f79d7a70-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f79d7a70-9b17-11ee-a7a5-af0e8425a262.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbbf1a2218e97abb47856d48d7fd49b1fd0fa8d7
--- /dev/null
+++ b/graph/incidents_graphml/f/f79d7a70-9b17-11ee-a7a5-af0e8425a262.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.145
+ 100.64.31.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702623773
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f79d7a70-9b17-11ee-a7a5-af0e8425a262
+
+
+
diff --git a/graph/incidents_graphml/f/f79e4a60-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f79e4a60-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..219dfe1996267dd056453c1a9c8372171d4e4fa3
--- /dev/null
+++ b/graph/incidents_graphml/f/f79e4a60-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.68
+ USER-0015-1732.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645671
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f79e4a60-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f7a5a920-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7a5a920-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d17a572122de35dfaa08d1caa440e10d3e7d4782
--- /dev/null
+++ b/graph/incidents_graphml/f/f7a5a920-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388832
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7a5a920-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa523d96e854a61ae3b249c950b69187bad2214f
--- /dev/null
+++ b/graph/incidents_graphml/f/f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.199
+ 100.64.10.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712472992
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a
+
+
+
diff --git a/graph/incidents_graphml/f/f7b25d30-3a24-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/f/f7b25d30-3a24-11ef-898a-03f77eec545d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7b618ad9a8ace50077a2bdcfd29246b94cf36fc
--- /dev/null
+++ b/graph/incidents_graphml/f/f7b25d30-3a24-11ef-898a-03f77eec545d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.104
+ 100.64.47.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720111592
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7b25d30-3a24-11ef-898a-03f77eec545d
+
+
+
diff --git a/graph/incidents_graphml/f/f7b8d230-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f7b8d230-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8251cbadeee9d25b0c4b7a1bd8fae888b28a7c0
--- /dev/null
+++ b/graph/incidents_graphml/f/f7b8d230-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.244
+ 100.64.8.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812392
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7b8d230-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f7c31c30-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7c31c30-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5110463c17c0671693a891365de6e03949b8771
--- /dev/null
+++ b/graph/incidents_graphml/f/f7c31c30-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.93
+ 100.64.27.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388832
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7c31c30-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f7c644c0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f7c644c0-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cc5b57cf05c71e5909ca000a944c800a15bb5ff
--- /dev/null
+++ b/graph/incidents_graphml/f/f7c644c0-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.68
+ USER-0015-1732.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689645671
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7c644c0-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f7c72560-a8b3-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/f/f7c72560-a8b3-11ee-bb9e-f554981233b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5f9dc9d37cd9ec74776fcdb8e55bed097016ae9
--- /dev/null
+++ b/graph/incidents_graphml/f/f7c72560-a8b3-11ee-bb9e-f554981233b0.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.61
+ USER-0015-1505.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.42
+ 100.64.68.42
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704120140
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7c72560-a8b3-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120140
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7c72560-a8b3-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120140
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7c72560-a8b3-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120140
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f7c72560-a8b3-11ee-bb9e-f554981233b0
+
+
+
diff --git a/graph/incidents_graphml/f/f7ce7d10-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f7ce7d10-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a77f0d5b2a5335ae81abd92c6ac046e61b3aa2fd
--- /dev/null
+++ b/graph/incidents_graphml/f/f7ce7d10-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.244
+ 100.64.8.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812392
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7ce7d10-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/f7d66bd0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f7d66bd0-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3c292667660faaac574084abe6109415fed71d4
--- /dev/null
+++ b/graph/incidents_graphml/f/f7d66bd0-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.187
+ 100.64.16.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718075777
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7d66bd0-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/f7e7d680-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f7e7d680-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d12e6686c867b94bd7c14c16c4bf76d3975889e
--- /dev/null
+++ b/graph/incidents_graphml/f/f7e7d680-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.71
+ 100.64.17.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7e7d680-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f7eb3220-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f7eb3220-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7405e2c5a6df7fcb993419188c26add3b1149782
--- /dev/null
+++ b/graph/incidents_graphml/f/f7eb3220-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.113
+ 100.64.40.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f7eb3220-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f7f10a00-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7f10a00-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a9a87838b603430c121e724094ab5855e570bc54
--- /dev/null
+++ b/graph/incidents_graphml/f/f7f10a00-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.93
+ 100.64.27.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388832
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f7f10a00-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f80095b0-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f80095b0-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82524abee14563f5d35d9ab644ffbdd6e5e3e234
--- /dev/null
+++ b/graph/incidents_graphml/f/f80095b0-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.18
+ 100.64.30.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239305
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f80095b0-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f8021580-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f8021580-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2682ffd65cceb02ff75741d29484db3f62315f10
--- /dev/null
+++ b/graph/incidents_graphml/f/f8021580-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.113
+ 100.64.40.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435751
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8021580-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f80221b0-2bbc-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/f/f80221b0-2bbc-11ef-b37a-07248b6407de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09948a9fa0e3037e9227ee9c77d06d2d0daa996d
--- /dev/null
+++ b/graph/incidents_graphml/f/f80221b0-2bbc-11ef-b37a-07248b6407de.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.41
+ 100.64.19.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718527608
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f80221b0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527608
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f80221b0-2bbc-11ef-b37a-07248b6407de
+
+
+
diff --git a/graph/incidents_graphml/f/f805e5d0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f805e5d0-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48a3acb1f620561a53abcd9232bb127127bb1098
--- /dev/null
+++ b/graph/incidents_graphml/f/f805e5d0-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.17.71
+ 100.64.17.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645671
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f805e5d0-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f809b050-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f809b050-176e-11ee-a7dc-57e99513cc0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1f543eea4db0691e28be1e7d2c823a2ab707f96
--- /dev/null
+++ b/graph/incidents_graphml/f/f809b050-176e-11ee-a7dc-57e99513cc0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1688147587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f809b050-176e-11ee-a7dc-57e99513cc0a
+
+
+
diff --git a/graph/incidents_graphml/f/f8101f40-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f8101f40-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..477c5091d187ce86d3a5c0499e07b5d5525e50da
--- /dev/null
+++ b/graph/incidents_graphml/f/f8101f40-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.163
+ 100.64.53.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8101f40-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f811c6a0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f811c6a0-176e-11ee-a7dc-57e99513cc0a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5975a1064fe96080ea4229c6037153c2b775405f
--- /dev/null
+++ b/graph/incidents_graphml/f/f811c6a0-176e-11ee-a7dc-57e99513cc0a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1688147587
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f811c6a0-176e-11ee-a7dc-57e99513cc0a
+
+
+
diff --git a/graph/incidents_graphml/f/f815a450-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f815a450-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de1f8ebf4e896f2bd608590afb9432fb3c2234cf
--- /dev/null
+++ b/graph/incidents_graphml/f/f815a450-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.18
+ 100.64.30.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239305
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f815a450-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f81f3a70-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f81f3a70-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a46ca0c648ae08c5698608c5869acaed9c4e6352
--- /dev/null
+++ b/graph/incidents_graphml/f/f81f3a70-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.163
+ 100.64.53.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435751
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f81f3a70-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/f8222060-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f8222060-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcbe74c280ac90cab6fee0bbb4b98358d2043f64
--- /dev/null
+++ b/graph/incidents_graphml/f/f8222060-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.71
+ 100.64.76.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689645671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8222060-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f8250da0-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f8250da0-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a6c0b148cb0f4ae3f988a10bb3b498e26846f80
--- /dev/null
+++ b/graph/incidents_graphml/f/f8250da0-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.20
+ 100.64.30.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239305
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8250da0-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f8280440-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f8280440-2f61-11ef-b208-d10830cadc66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4122ecf3b98742684278861e012dd8bcc4da171d
--- /dev/null
+++ b/graph/incidents_graphml/f/f8280440-2f61-11ef-b208-d10830cadc66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.148
+ 100.64.83.148
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1718928329
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8280440-2f61-11ef-b208-d10830cadc66
+
+
+
diff --git a/graph/incidents_graphml/f/f837ab40-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f837ab40-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52dd47cddaebb4855ab83fb54d282ddcbb534feb
--- /dev/null
+++ b/graph/incidents_graphml/f/f837ab40-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.20
+ 100.64.30.20
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239305
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f837ab40-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f83f9360-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f83f9360-efc3-11ec-9799-0176ac54cf1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b263567b8be2c10ad50091f65ace9584297805f6
--- /dev/null
+++ b/graph/incidents_graphml/f/f83f9360-efc3-11ec-9799-0176ac54cf1b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.37
+ USER-0015-1666.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655638550
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f83f9360-efc3-11ec-9799-0176ac54cf1b
+
+
+ INCIDENT_LINK
+ 1655638550
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f83f9360-efc3-11ec-9799-0176ac54cf1b
+
+
+
diff --git a/graph/incidents_graphml/f/f84233a0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f84233a0-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce7db8e43b28c14518aadb877590c9e356467753
--- /dev/null
+++ b/graph/incidents_graphml/f/f84233a0-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.139
+ 100.64.83.139
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f84233a0-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f8482710-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f8482710-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..992b45a7cd8538bf187a1fe437b6520d11d0cd00
--- /dev/null
+++ b/graph/incidents_graphml/f/f8482710-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.139
+ 100.64.83.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8482710-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f84b5b60-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f84b5b60-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8015a602ab7e30b3343f6703cd265542c3994cf6
--- /dev/null
+++ b/graph/incidents_graphml/f/f84b5b60-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.140
+ 100.64.83.140
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f84b5b60-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f8532390-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f8532390-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33d7f4234863cd24703e67c6fab8024854091114
--- /dev/null
+++ b/graph/incidents_graphml/f/f8532390-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.141
+ 100.64.83.141
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8532390-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f853b700-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/f853b700-01e1-11ef-a2c7-1dd1210cf0bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a3917d32616ce0942b30ea8c0a79e824119026e
--- /dev/null
+++ b/graph/incidents_graphml/f/f853b700-01e1-11ef-a2c7-1dd1210cf0bf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.55
+ 100.64.28.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713925551
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f853b700-01e1-11ef-a2c7-1dd1210cf0bf
+
+
+
diff --git a/graph/incidents_graphml/f/f8577000-ec76-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/f/f8577000-ec76-11ee-a77b-a53bbd4435f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df90652886b115bd902417329756a6e287a69370
--- /dev/null
+++ b/graph/incidents_graphml/f/f8577000-ec76-11ee-a77b-a53bbd4435f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.237
+ 100.64.53.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711570621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8577000-ec76-11ee-a77b-a53bbd4435f6
+
+
+
diff --git a/graph/incidents_graphml/f/f859da50-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f859da50-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4288a796c7b2db0b945117092daea9e3aecc57a4
--- /dev/null
+++ b/graph/incidents_graphml/f/f859da50-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.141
+ 100.64.83.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f859da50-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f85a0050-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f85a0050-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f490523ef3aea8f8815d9d5c84e338aee9a8f9f
--- /dev/null
+++ b/graph/incidents_graphml/f/f85a0050-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.73
+ 100.64.47.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f85a0050-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/f/f85f7260-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/f/f85f7260-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0a27ea2e7e0eea234025f2d5ec6053088377727
--- /dev/null
+++ b/graph/incidents_graphml/f/f85f7260-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.178
+ 100.64.49.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.179
+ 100.64.49.179
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.180
+ 100.64.49.180
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.181
+ USER-0015-1383.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f85f7260-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/f/f85fa6b0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f85fa6b0-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90502ecf040d980c72ad3c6fd1ada4dd29e313ad
--- /dev/null
+++ b/graph/incidents_graphml/f/f85fa6b0-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.142
+ 100.64.83.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f85fa6b0-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f86100a0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f86100a0-56ff-11ee-82f3-cfca3c4a6159.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..635e66d8f149fb528fd1ec210e58626f86ea794b
--- /dev/null
+++ b/graph/incidents_graphml/f/f86100a0-56ff-11ee-82f3-cfca3c4a6159.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.29
+ 100.64.15.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695136787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f86100a0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f86100a0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f86100a0-56ff-11ee-82f3-cfca3c4a6159
+
+
+ INCIDENT_LINK
+ 1695136787
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f86100a0-56ff-11ee-82f3-cfca3c4a6159
+
+
+
diff --git a/graph/incidents_graphml/f/f86458d0-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/f86458d0-01e1-11ef-a2c7-1dd1210cf0bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e17254f4fd4b45b25ddc77a48ec6199846a172d
--- /dev/null
+++ b/graph/incidents_graphml/f/f86458d0-01e1-11ef-a2c7-1dd1210cf0bf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.55
+ 100.64.28.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713925551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f86458d0-01e1-11ef-a2c7-1dd1210cf0bf
+
+
+
diff --git a/graph/incidents_graphml/f/f865e840-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f865e840-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c38c4f491832edbb6010b9c3d665707c9cd0ae2a
--- /dev/null
+++ b/graph/incidents_graphml/f/f865e840-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.83.142
+ 100.64.83.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f865e840-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f86a06f0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f86a06f0-624f-11ed-93f8-4552f33ca5e0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3aaf69f34a6b12f596fc9e2290a67160bc488597
--- /dev/null
+++ b/graph/incidents_graphml/f/f86a06f0-624f-11ed-93f8-4552f33ca5e0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.146.99.50
+ 10.146.99.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","AWS VPC Security"]
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","AWS VPC Security"]
+
+
+ INCIDENT_LINK
+ 1668233112
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f86a06f0-624f-11ed-93f8-4552f33ca5e0
+
+
+
diff --git a/graph/incidents_graphml/f/f86c5790-ec76-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/f/f86c5790-ec76-11ee-a77b-a53bbd4435f6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77049331730eef35dbcbd65e2b29501f463c68cc
--- /dev/null
+++ b/graph/incidents_graphml/f/f86c5790-ec76-11ee-a77b-a53bbd4435f6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.237
+ 100.64.53.237
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711570621
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f86c5790-ec76-11ee-a77b-a53bbd4435f6
+
+
+
diff --git a/graph/incidents_graphml/f/f8714cb0-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/f/f8714cb0-26cd-11ee-863d-83828757c718.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bd90abee126b728e577448deaf95d6587a97f3e
--- /dev/null
+++ b/graph/incidents_graphml/f/f8714cb0-26cd-11ee-863d-83828757c718.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.186
+ 100.64.49.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.187
+ 100.64.49.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.188
+ USER-0015-1384.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8714cb0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8714cb0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8714cb0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8714cb0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8714cb0-26cd-11ee-863d-83828757c718
+
+
+ INCIDENT_LINK
+ 1689837657
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8714cb0-26cd-11ee-863d-83828757c718
+
+
+
diff --git a/graph/incidents_graphml/f/f872a950-156c-11ef-aecb-e5bec61c0532.graphml b/graph/incidents_graphml/f/f872a950-156c-11ef-aecb-e5bec61c0532.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..debf692ca61e0a4809f6dc77dff1ca7e4b5a4e7c
--- /dev/null
+++ b/graph/incidents_graphml/f/f872a950-156c-11ef-aecb-e5bec61c0532.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.238
+ 100.64.29.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716074324
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f872a950-156c-11ef-aecb-e5bec61c0532
+
+
+
diff --git a/graph/incidents_graphml/f/f8777810-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f8777810-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..863c0971e7e580b92905e7084fb7039036419087
--- /dev/null
+++ b/graph/incidents_graphml/f/f8777810-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,93 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.95
+ 100.64.27.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8777810-22b8-11ee-8861-516dde03d998
+
+
+ INCIDENT_LINK
+ 1689388833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8777810-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f244a9372a3cd7da023b1000710d76d1712777d0
--- /dev/null
+++ b/graph/incidents_graphml/f/f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.41
+ 100.64.50.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713925552
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf
+
+
+
diff --git a/graph/incidents_graphml/f/f88045f0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f88045f0-250e-11ee-8dd6-41dd8139c6e5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d2575a46aefe5e5a232271daa3d2116e27879f9
--- /dev/null
+++ b/graph/incidents_graphml/f/f88045f0-250e-11ee-8dd6-41dd8139c6e5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.72
+ 100.64.76.72
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1689645672
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f88045f0-250e-11ee-8dd6-41dd8139c6e5
+
+
+
diff --git a/graph/incidents_graphml/f/f893ce80-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f893ce80-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..380bb9fcbd012bfe31df9bb81a4df0a7a0fecf24
--- /dev/null
+++ b/graph/incidents_graphml/f/f893ce80-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.101
+ 100.64.74.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 192.168.199.244
+ 192.168.199.244
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.102
+ 100.64.74.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688351169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f893ce80-1948-11ee-8b71-f9525f65ac72
+
+
+ INCIDENT_LINK
+ 1688351169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f893ce80-1948-11ee-8b71-f9525f65ac72
+
+
+ INCIDENT_LINK
+ 1688351169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f893ce80-1948-11ee-8b71-f9525f65ac72
+
+
+ INCIDENT_LINK
+ 1688351169
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f893ce80-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/f89427d0-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f89427d0-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3ddf3949866e0f6d3cabc017d801e9b055288fd
--- /dev/null
+++ b/graph/incidents_graphml/f/f89427d0-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388833
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f89427d0-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f8959ad0-a061-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/f/f8959ad0-a061-11ee-9181-41cbe26a7b16.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..931edb4886eb24cd4485c6c87f855cc14295cc4a
--- /dev/null
+++ b/graph/incidents_graphml/f/f8959ad0-a061-11ee-9181-41cbe26a7b16.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.135
+ 100.64.29.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703205313
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8959ad0-a061-11ee-9181-41cbe26a7b16
+
+
+ INCIDENT_LINK
+ 1703205313
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8959ad0-a061-11ee-9181-41cbe26a7b16
+
+
+
diff --git a/graph/incidents_graphml/f/f896cba0-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f896cba0-2f61-11ef-b208-d10830cadc66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecc5c96596f6c0b242972af8d5ac87ec0c9c2591
--- /dev/null
+++ b/graph/incidents_graphml/f/f896cba0-2f61-11ef-b208-d10830cadc66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.7.26
+ 100.64.7.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718928330
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f896cba0-2f61-11ef-b208-d10830cadc66
+
+
+
diff --git a/graph/incidents_graphml/f/f8a04b30-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/f8a04b30-a79e-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c03eb0d9159762f64e025b890f06c6fd505661f7
--- /dev/null
+++ b/graph/incidents_graphml/f/f8a04b30-a79e-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.163
+ 100.64.10.163
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.164
+ 100.64.10.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.166
+ 100.64.10.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.167
+ 100.64.10.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.168
+ 100.64.10.168
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.169
+ 100.64.10.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.170
+ 100.64.10.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.84
+ 100.64.8.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.171
+ 100.64.10.171
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.172
+ 100.64.10.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.173
+ 100.64.10.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.174
+ 100.64.10.174
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.70
+ 100.64.8.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001171
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8a04b30-a79e-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/f/f8a74c30-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f8a74c30-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bae672f2f879deaf3c5f802682fd8714d72ab5b
--- /dev/null
+++ b/graph/incidents_graphml/f/f8a74c30-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.63
+ 100.64.16.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685598095
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8a74c30-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/f8aa30f0-086f-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/f/f8aa30f0-086f-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec8d0bc5a8ca1bf0fe42b2e3079fe344581abe13
--- /dev/null
+++ b/graph/incidents_graphml/f/f8aa30f0-086f-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,373 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.173
+ 100.64.58.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.153
+ 100.64.25.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.70
+ 100.64.6.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.174
+ 100.64.58.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.175
+ 100.64.58.175
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.176
+ 100.64.58.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.229
+ 100.64.5.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.199
+ 100.64.54.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.177
+ 100.64.58.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+ INCIDENT_LINK
+ 1714646247
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8aa30f0-086f-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/f/f8b67e40-8981-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/f/f8b67e40-8981-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12783983bc323dd70f5bc1e4f3e12e7ce38835d8
--- /dev/null
+++ b/graph/incidents_graphml/f/f8b67e40-8981-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.157
+ 100.64.9.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.2
+ 100.64.31.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.189
+ 100.64.23.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.37
+ 100.64.30.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.83
+ 100.64.33.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.84
+ 100.64.33.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.16
+ 100.64.27.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.85
+ 100.64.33.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.86
+ 100.64.33.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.87
+ 100.64.33.87
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.47
+ 100.64.33.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.88
+ 100.64.33.88
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.89
+ 100.64.33.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.90
+ 100.64.33.90
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.91
+ 100.64.33.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Azure Security"]
+
+
+ HOST
+ 100.64.33.92
+ 100.64.33.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.93
+ 100.64.33.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.94
+ USER-0015-1298.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.156
+ 100.64.8.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.95
+ 100.64.33.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b67e40-8981-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/f/f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a124526e6f0b2b37350eaf169c977369b96cef0
--- /dev/null
+++ b/graph/incidents_graphml/f/f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.184
+ 100.64.24.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084916
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/f8ba2970-1c98-11ed-af5f-bdf516dc7507.graphml b/graph/incidents_graphml/f/f8ba2970-1c98-11ed-af5f-bdf516dc7507.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81d945a815366331353e0b6f0a466b9d8e1f04c4
--- /dev/null
+++ b/graph/incidents_graphml/f/f8ba2970-1c98-11ed-af5f-bdf516dc7507.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.84.128
+ 100.64.84.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660567885
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8ba2970-1c98-11ed-af5f-bdf516dc7507
+
+
+
diff --git a/graph/incidents_graphml/f/f8bc4940-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f8bc4940-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c67a16b4e7b7200c738c73103c3c5b7d2eb19aad
--- /dev/null
+++ b/graph/incidents_graphml/f/f8bc4940-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.101
+ 100.64.10.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8bc4940-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f8c341e0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f8c341e0-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..842fae80d5596a96c12fa2d6f6a6f60d8815ae3b
--- /dev/null
+++ b/graph/incidents_graphml/f/f8c341e0-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.145
+ 100.64.7.145
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.146
+ 100.64.7.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.147
+ 100.64.7.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.148
+ 100.64.7.148
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.149
+ 100.64.7.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.150
+ 100.64.7.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.151
+ 100.64.7.151
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.152
+ 100.64.7.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.153
+ 100.64.7.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.154
+ 100.64.7.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.156
+ 100.64.7.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.10
+ 100.64.6.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.157
+ 100.64.7.157
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.158
+ 100.64.7.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.159
+ 100.64.7.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.160
+ 100.64.7.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.161
+ 100.64.7.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.162
+ 100.64.7.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.163
+ 100.64.7.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882526
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c341e0-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/f8c98170-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/f/f8c98170-3026-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57f2b89068ad63652ca53d0f857f4c3883e221ae
--- /dev/null
+++ b/graph/incidents_graphml/f/f8c98170-3026-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690865443
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c98170-3026-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865443
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8c98170-3026-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/f/f8d170e0-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/f/f8d170e0-21fe-11ef-a065-0d11f2930c39.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df99add10250253e90a65681ad47fd37b5fa6f54
--- /dev/null
+++ b/graph/incidents_graphml/f/f8d170e0-21fe-11ef-a065-0d11f2930c39.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.159
+ 100.64.32.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717456445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8d170e0-21fe-11ef-a065-0d11f2930c39
+
+
+
diff --git a/graph/incidents_graphml/f/f8d6f270-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f8d6f270-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c69e35528726b91a93dde10814056fae1c387cd1
--- /dev/null
+++ b/graph/incidents_graphml/f/f8d6f270-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.156
+ 100.64.19.156
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8d6f270-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/f8d995c0-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f8d995c0-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0965e23356409471f0c2ef5c43d9a24d3d1750cd
--- /dev/null
+++ b/graph/incidents_graphml/f/f8d995c0-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.131
+ 100.64.50.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8d995c0-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fb414566562f3cdc04fc29e8a556ecc9667aa28
--- /dev/null
+++ b/graph/incidents_graphml/f/f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.184
+ 100.64.24.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084916
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/f8dc73b0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f8dc73b0-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72b411d3837267682ee600a399fa2a983ce50471
--- /dev/null
+++ b/graph/incidents_graphml/f/f8dc73b0-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.53
+ 100.64.17.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.249
+ 100.64.18.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8dc73b0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8dc73b0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8dc73b0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8dc73b0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8dc73b0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f8dc73b0-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f8e04750-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f8e04750-6106-11ee-bc15-ebbbf2eb09b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c8d3a9309cbc749fa661dc6cd822e5e7d9b84dc
--- /dev/null
+++ b/graph/incidents_graphml/f/f8e04750-6106-11ee-bc15-ebbbf2eb09b5.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.22
+ 100.64.30.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696239306
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8e04750-6106-11ee-bc15-ebbbf2eb09b5
+
+
+ INCIDENT_LINK
+ 1696239306
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8e04750-6106-11ee-bc15-ebbbf2eb09b5
+
+
+
diff --git a/graph/incidents_graphml/f/f8e25a30-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/f8e25a30-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6345e192175c084590f5b611901078381482555
--- /dev/null
+++ b/graph/incidents_graphml/f/f8e25a30-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.66
+ 100.64.21.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093672
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8e25a30-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/f8e9b720-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f8e9b720-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c10250b40121f6c4f636a762584beae61979def0
--- /dev/null
+++ b/graph/incidents_graphml/f/f8e9b720-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.225
+ 100.64.34.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947623
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8e9b720-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/f8eca890-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f8eca890-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce7afd4b31ef4ad1f4db448c9f0a69d568f20718
--- /dev/null
+++ b/graph/incidents_graphml/f/f8eca890-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.131
+ 100.64.50.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452801
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f8eca890-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f8edd8d0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f8edd8d0-0a07-11ee-9f50-eb86987e1788.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fea5f7da026102eca1138f579f1be399f881182d
--- /dev/null
+++ b/graph/incidents_graphml/f/f8edd8d0-0a07-11ee-9f50-eb86987e1788.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.73
+ 100.64.29.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.72
+ 100.64.18.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8edd8d0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8edd8d0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8edd8d0-0a07-11ee-9f50-eb86987e1788
+
+
+ INCIDENT_LINK
+ 1686673985
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8edd8d0-0a07-11ee-9f50-eb86987e1788
+
+
+
diff --git a/graph/incidents_graphml/f/f8f10d70-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f8f10d70-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd2a0326c4e8f0bfe0a8af84010459a5cc6f43cb
--- /dev/null
+++ b/graph/incidents_graphml/f/f8f10d70-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.186
+ 100.64.24.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084916
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8f10d70-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/f8f5de90-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f8f5de90-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1dec630ef43e28a6a5b235fe34abe754ea5188c
--- /dev/null
+++ b/graph/incidents_graphml/f/f8f5de90-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.7
+ 100.64.33.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465852
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f5de90-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/f8f757d0-8981-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/f/f8f757d0-8981-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ad30a87b2bd89744373c6aacce433fa0c4cfa15
--- /dev/null
+++ b/graph/incidents_graphml/f/f8f757d0-8981-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,873 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.111
+ 100.64.33.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.163
+ 100.64.22.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.112
+ 100.64.33.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.113
+ 100.64.33.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.85
+ 100.64.33.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.81
+ 100.64.33.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.114
+ 100.64.33.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.115
+ 100.64.33.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.116
+ 100.64.33.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.117
+ 100.64.33.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.19
+ 100.64.9.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.228
+ 100.64.14.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.4
+ 100.64.10.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.118
+ 100.64.33.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.119
+ 100.64.33.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f8f757d0-8981-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/f/f8fa1610-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f8fa1610-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63d41d4ecd7b6f4c6ee46be4de0e58cda89187b9
--- /dev/null
+++ b/graph/incidents_graphml/f/f8fa1610-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.133
+ 100.64.50.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452801
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f8fa1610-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f902ca40-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f902ca40-1bdf-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6025a51ba889081e017eaceb6d685e772320ca9
--- /dev/null
+++ b/graph/incidents_graphml/f/f902ca40-1bdf-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.90.22
+ 100.64.90.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660488428
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f902ca40-1bdf-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/f9040b00-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9040b00-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ae0bfa4eff3a5738ac88aca702ffb865c3e54f6
--- /dev/null
+++ b/graph/incidents_graphml/f/f9040b00-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.203
+ 100.64.34.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815823
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f9040b00-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..343fe57309a49bd936ca5d5caa9f56506d001386
--- /dev/null
+++ b/graph/incidents_graphml/f/f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.117
+ 100.64.40.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f9095060-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f9095060-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31224d9c63a0697f6e85c590bf6b743bb98cd67d
--- /dev/null
+++ b/graph/incidents_graphml/f/f9095060-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.186
+ 100.64.24.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084916
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9095060-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/f9095850-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f9095850-7e40-11ee-a30b-3ba0d2ef4424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7870e0e91bd06121eec8b4f5499975e3669ea798
--- /dev/null
+++ b/graph/incidents_graphml/f/f9095850-7e40-11ee-a30b-3ba0d2ef4424.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.133
+ 100.64.50.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699452801
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9095850-7e40-11ee-a30b-3ba0d2ef4424
+
+
+
diff --git a/graph/incidents_graphml/f/f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..578ebd6b4bbad1658ba868df0a5721884559bab6
--- /dev/null
+++ b/graph/incidents_graphml/f/f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.22
+ 100.64.90.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660488428
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/f90e7f70-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f90e7f70-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3bb7ea402c10c7e5bc15b9aa8677d051b35aa803
--- /dev/null
+++ b/graph/incidents_graphml/f/f90e7f70-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.13
+ 100.64.33.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f90e7f70-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f91f2140-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f91f2140-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2e9575d4d055ffbde6eb9dc75e1323f53572e8c
--- /dev/null
+++ b/graph/incidents_graphml/f/f91f2140-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.46
+ 100.64.19.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f91f2140-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f9292940-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9292940-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0f8fc04b65d412fcb826d43148ab50c103013be7
--- /dev/null
+++ b/graph/incidents_graphml/f/f9292940-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.176
+ 100.64.46.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9292940-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f92a75c0-8981-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/f/f92a75c0-8981-11ee-94ad-436ebf198b76.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9668e63a55bb1855a06f3f3e9e264286424912f0
--- /dev/null
+++ b/graph/incidents_graphml/f/f92a75c0-8981-11ee-94ad-436ebf198b76.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.2
+ 100.64.18.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.131
+ 100.64.33.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.132
+ 100.64.33.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.111
+ 100.64.30.111
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.178
+ 100.64.11.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.134
+ 100.64.33.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.135
+ 100.64.33.135
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.136
+ 100.64.33.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.159
+ 100.64.14.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.137
+ 100.64.33.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.233
+ 100.64.10.233
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.49
+ 100.64.22.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.138
+ 100.64.33.138
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.139
+ 100.64.33.139
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+ INCIDENT_LINK
+ 1700690181
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f92a75c0-8981-11ee-94ad-436ebf198b76
+
+
+
diff --git a/graph/incidents_graphml/f/f9307960-a8b3-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/f/f9307960-a8b3-11ee-bb9e-f554981233b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13806923d6f529bd76f4e0371e4365b5e225998b
--- /dev/null
+++ b/graph/incidents_graphml/f/f9307960-a8b3-11ee-bb9e-f554981233b0.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.151
+ 100.64.68.151
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.37.112
+ 100.64.37.112
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1704120142
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9307960-a8b3-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120142
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9307960-a8b3-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120142
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9307960-a8b3-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120142
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9307960-a8b3-11ee-bb9e-f554981233b0
+
+
+
diff --git a/graph/incidents_graphml/f/f9326e00-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9326e00-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a66aad2f2a525e6be2102ec92fc1884f3608a8d
--- /dev/null
+++ b/graph/incidents_graphml/f/f9326e00-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.102
+ 100.64.57.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815823
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9326e00-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f934a510-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f934a510-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb9967ef68563888c350d19c0986afea63855246
--- /dev/null
+++ b/graph/incidents_graphml/f/f934a510-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.46
+ 100.64.19.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f934a510-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c14527dd1e7de8b28eac80cadf1f61c502c6aeb9
--- /dev/null
+++ b/graph/incidents_graphml/f/f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.176
+ 100.64.46.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f93c2110-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f93c2110-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bb188cebd4e9d9f7d29dd9455ce1d29e061f606
--- /dev/null
+++ b/graph/incidents_graphml/f/f93c2110-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.207
+ USER-0015-1824.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93c2110-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f93fe870-6e78-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/f/f93fe870-6e78-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdf75451b72fa78741586d0d8a12868c0223b375
--- /dev/null
+++ b/graph/incidents_graphml/f/f93fe870-6e78-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.158
+ 100.64.15.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.4
+ 100.64.10.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.159
+ 100.64.15.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.160
+ 100.64.15.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.161
+ 100.64.15.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.162
+ 100.64.15.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.163
+ 100.64.15.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.164
+ 100.64.15.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.165
+ 100.64.15.165
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.166
+ 100.64.15.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.118
+ 100.64.12.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717635
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f93fe870-6e78-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/f/f94336e0-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f94336e0-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5497798a1c78c6156f4bc823a9a4e78dfb5b488
--- /dev/null
+++ b/graph/incidents_graphml/f/f94336e0-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.102
+ 100.64.57.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815823
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f94336e0-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f943f2e0-4401-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/f/f943f2e0-4401-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9bed6d2cb9d09c384fbbf647324222a4170159c
--- /dev/null
+++ b/graph/incidents_graphml/f/f943f2e0-4401-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.62.231
+ 100.64.62.231
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.63
+ 100.64.17.63
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.232
+ 100.64.62.232
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.233
+ 100.64.62.233
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.234
+ 100.64.62.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048576
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f943f2e0-4401-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/f/f9446810-1c98-11ed-af5f-bdf516dc7507.graphml b/graph/incidents_graphml/f/f9446810-1c98-11ed-af5f-bdf516dc7507.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49c0482426fce2bd8fd164cd1e86336be4d7aa8a
--- /dev/null
+++ b/graph/incidents_graphml/f/f9446810-1c98-11ed-af5f-bdf516dc7507.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.133
+ 100.64.84.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660567886
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9446810-1c98-11ed-af5f-bdf516dc7507
+
+
+
diff --git a/graph/incidents_graphml/f/f945d4b0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f945d4b0-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2541d4b8751d3cbfea049f645099edaeb682c74
--- /dev/null
+++ b/graph/incidents_graphml/f/f945d4b0-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.30
+ 100.64.40.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855766
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f945d4b0-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f9460160-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f9460160-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d15981fcb877593f70c4711d854c8493f308a982
--- /dev/null
+++ b/graph/incidents_graphml/f/f9460160-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.197
+ 100.64.37.197
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718075780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9460160-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/f946a860-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f946a860-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e73d1e0a5036922dfc4b4921ddb2e57a099497c9
--- /dev/null
+++ b/graph/incidents_graphml/f/f946a860-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.207
+ USER-0015-1824.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f946a860-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f9488640-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/f/f9488640-2f46-11ee-8421-f3eff1a35bff.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04cc8fb96e9ee7401d5c038dcf9f3a0f92ab3b35
--- /dev/null
+++ b/graph/incidents_graphml/f/f9488640-2f46-11ee-8421-f3eff1a35bff.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.4.6
+ 100.64.4.6
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690769237
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9488640-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769237
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9488640-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769237
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9488640-2f46-11ee-8421-f3eff1a35bff
+
+
+ INCIDENT_LINK
+ 1690769237
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9488640-2f46-11ee-8421-f3eff1a35bff
+
+
+
diff --git a/graph/incidents_graphml/f/f9495b70-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9495b70-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..723cf1730e4da011ba44e0846ba4959bcb2ac768
--- /dev/null
+++ b/graph/incidents_graphml/f/f9495b70-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9495b70-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f94b1340-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f94b1340-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2cec17bcb4b00cf51644708d47cd521c24e2763
--- /dev/null
+++ b/graph/incidents_graphml/f/f94b1340-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.191
+ 100.64.39.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274096
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f94b1340-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f94bfb60-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f94bfb60-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ce5f5ee6f346c4eefef90b2a83a809ca5504d52
--- /dev/null
+++ b/graph/incidents_graphml/f/f94bfb60-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.254
+ 100.64.14.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947624
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f94bfb60-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/f94d4ce0-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f94d4ce0-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acc697713a00b6236eabca59bf0c3a5890960ceb
--- /dev/null
+++ b/graph/incidents_graphml/f/f94d4ce0-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.231
+ HOST-3909
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375354
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f94d4ce0-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/f/f950f280-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f950f280-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81c15419ede9659a6a659c32819b25263a44040c
--- /dev/null
+++ b/graph/incidents_graphml/f/f950f280-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.103
+ 100.64.57.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815823
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f950f280-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f952b650-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f952b650-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa97c7f6a35ce1901573d69eb8acec345cee2c8f
--- /dev/null
+++ b/graph/incidents_graphml/f/f952b650-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.208
+ 100.64.79.208
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f952b650-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f95787f0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f95787f0-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ec1b413b01846982492cb35d35f34d28450a0b5
--- /dev/null
+++ b/graph/incidents_graphml/f/f95787f0-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.30
+ 100.64.40.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855767
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f95787f0-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f9591d00-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f9591d00-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5718abd5805b7a719772e87913af8473bc5176fe
--- /dev/null
+++ b/graph/incidents_graphml/f/f9591d00-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.193
+ 100.64.39.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274096
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9591d00-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f95c5ea0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f95c5ea0-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5219d0cd2e15ebffc75ca3a2b6c64159bae6261
--- /dev/null
+++ b/graph/incidents_graphml/f/f95c5ea0-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.103
+ 100.64.11.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355174
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f95c5ea0-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/f95cef80-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f95cef80-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..508786200c4dec00d1f724996712be3869f049c0
--- /dev/null
+++ b/graph/incidents_graphml/f/f95cef80-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.208
+ 100.64.79.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f95cef80-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f95e7180-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f95e7180-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06a301a8730f990fc5587681bcffc9d6abbe5a4a
--- /dev/null
+++ b/graph/incidents_graphml/f/f95e7180-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.73
+ 100.64.13.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.248
+ 100.64.70.248
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688351170
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f95e7180-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4391da0216f03d71c923d11012533f3b48c8cef6
--- /dev/null
+++ b/graph/incidents_graphml/f/f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.103
+ 100.64.57.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815823
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f9603620-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f9603620-2f61-11ef-b208-d10830cadc66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57f3acbcab1e2e675419ec980f8deed145760ff8
--- /dev/null
+++ b/graph/incidents_graphml/f/f9603620-2f61-11ef-b208-d10830cadc66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.155
+ USER-0015-2014.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1718928331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9603620-2f61-11ef-b208-d10830cadc66
+
+
+
diff --git a/graph/incidents_graphml/f/f965b8c0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f965b8c0-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94644153249d876d9bbfa5a539acd9c5916dc0f4
--- /dev/null
+++ b/graph/incidents_graphml/f/f965b8c0-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.170
+ 100.64.33.170
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855767
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f965b8c0-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f96792d0-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/f96792d0-a79e-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7168f9133d3c6fa6a9f220049310e9ac910a53c
--- /dev/null
+++ b/graph/incidents_graphml/f/f96792d0-a79e-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.187
+ 100.64.10.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.188
+ 100.64.10.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.189
+ 100.64.10.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.190
+ 100.64.10.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.191
+ 100.64.10.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.192
+ 100.64.10.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001172
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96792d0-a79e-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/f/f96970b0-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f96970b0-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ffaea61c96bc4e442b45baa7332d15c6b6a8035
--- /dev/null
+++ b/graph/incidents_graphml/f/f96970b0-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.193
+ 100.64.39.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274097
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96970b0-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f96bef00-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f96bef00-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ee2ea28c47e6d798e85084f2580255b58bf91be
--- /dev/null
+++ b/graph/incidents_graphml/f/f96bef00-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.103
+ 100.64.11.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355174
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96bef00-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/f96c58d0-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f96c58d0-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13cc4d98d3c0f84bbc85f50d7c870807131d6e4b
--- /dev/null
+++ b/graph/incidents_graphml/f/f96c58d0-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.209
+ 100.64.79.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f96c58d0-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f970fc40-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f970fc40-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9346a31b122cc1a426a86afe744bd27f4e377194
--- /dev/null
+++ b/graph/incidents_graphml/f/f970fc40-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.160
+ 100.64.7.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178153
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f970fc40-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f9714bb0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f9714bb0-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0f511382b245e2f65e792dccaf8c8a277d3167d
--- /dev/null
+++ b/graph/incidents_graphml/f/f9714bb0-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.217
+ 100.64.73.217
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.151
+ 100.64.77.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.180
+ 100.64.71.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.69
+ 100.64.73.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.152
+ 100.64.77.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9714bb0-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/f/f9734790-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9734790-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..525bd2f7c385d047bbcbc3087a27119cd440502c
--- /dev/null
+++ b/graph/incidents_graphml/f/f9734790-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9734790-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f974ce20-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f974ce20-11e8-11ed-97d5-3360f7274b74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3553d99c36713fbbda776b0a6b5c8e8a80fba58d
--- /dev/null
+++ b/graph/incidents_graphml/f/f974ce20-11e8-11ed-97d5-3360f7274b74.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.96
+ 100.64.74.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.45
+ USER-0015-1748.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.87
+ 100.64.76.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f974ce20-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f974ce20-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f974ce20-11e8-11ed-97d5-3360f7274b74
+
+
+ INCIDENT_LINK
+ 1659392783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f974ce20-11e8-11ed-97d5-3360f7274b74
+
+
+
diff --git a/graph/incidents_graphml/f/f9750b60-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f9750b60-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b98ff719cab34ffa99a8f6c411885e3c49bec39
--- /dev/null
+++ b/graph/incidents_graphml/f/f9750b60-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.210
+ 100.64.79.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9750b60-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f9754920-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9754920-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09335bb96179eea55d671916b62b79bc6c1ba058
--- /dev/null
+++ b/graph/incidents_graphml/f/f9754920-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.170
+ 100.64.33.170
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855767
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9754920-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f97df750-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f97df750-2f61-11ef-b208-d10830cadc66.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f3fada3f486465f9f5a0cb2bc8321a34c3d183e
--- /dev/null
+++ b/graph/incidents_graphml/f/f97df750-2f61-11ef-b208-d10830cadc66.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.29.155
+ USER-0015-2014.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718928331
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f97df750-2f61-11ef-b208-d10830cadc66
+
+
+
diff --git a/graph/incidents_graphml/f/f97e5a30-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f97e5a30-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7d58b62800cf5d8f6b637638fa885763361ec10e
--- /dev/null
+++ b/graph/incidents_graphml/f/f97e5a30-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.210
+ 100.64.79.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f97e5a30-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f981a980-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f981a980-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e6d04d20d2d31e6cc2d26e686f47b925ea80846
--- /dev/null
+++ b/graph/incidents_graphml/f/f981a980-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.178
+ 100.64.46.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f981a980-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f981c680-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f981c680-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6971cf6d2082582ca1e50e759e006f0a6016f9ab
--- /dev/null
+++ b/graph/incidents_graphml/f/f981c680-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.207
+ 100.64.49.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f981c680-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f981d980-e2a2-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/f/f981d980-e2a2-11ee-8bca-5190faa7db82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b7d67d652f3e4c91bbf799e7c68685c7f3df07b
--- /dev/null
+++ b/graph/incidents_graphml/f/f981d980-e2a2-11ee-8bca-5190faa7db82.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.83
+ 100.64.23.83
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.11.198
+ 100.64.11.198
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.229
+ 100.64.68.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710490009
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f981d980-e2a2-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490009
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f981d980-e2a2-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490009
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f981d980-e2a2-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490009
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f981d980-e2a2-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490009
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f981d980-e2a2-11ee-8bca-5190faa7db82
+
+
+ INCIDENT_LINK
+ 1710490009
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f981d980-e2a2-11ee-8bca-5190faa7db82
+
+
+
diff --git a/graph/incidents_graphml/f/f98631f0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f98631f0-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..913de25b45ad6248c3a85a944c911bc327a81035
--- /dev/null
+++ b/graph/incidents_graphml/f/f98631f0-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.169
+ 100.64.26.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178153
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f98631f0-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f9877020-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f9877020-9b17-11ee-a7a5-af0e8425a262.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1fa4aad6ce2d7c29695e050925cc1c8f0933d04a
--- /dev/null
+++ b/graph/incidents_graphml/f/f9877020-9b17-11ee-a7a5-af0e8425a262.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.149
+ 100.64.31.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702623776
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9877020-9b17-11ee-a7a5-af0e8425a262
+
+
+
diff --git a/graph/incidents_graphml/f/f99139e0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f99139e0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..227905ffdd8bd0e15d5f292ad8cb63386ead3567
--- /dev/null
+++ b/graph/incidents_graphml/f/f99139e0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.178
+ 100.64.46.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295011
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f99139e0-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f9992d80-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/f/f9992d80-3026-11ee-a433-a916fb2bb25a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..182dd1deec85790040d96129e898f29c429278d5
--- /dev/null
+++ b/graph/incidents_graphml/f/f9992d80-3026-11ee-a433-a916fb2bb25a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.31
+ 100.64.68.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690865444
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9992d80-3026-11ee-a433-a916fb2bb25a
+
+
+ INCIDENT_LINK
+ 1690865444
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9992d80-3026-11ee-a433-a916fb2bb25a
+
+
+
diff --git a/graph/incidents_graphml/f/f99acb60-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f99acb60-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb70f90992e1097039a823dc572fe2cccf987b72
--- /dev/null
+++ b/graph/incidents_graphml/f/f99acb60-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.169
+ 100.64.26.169
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178153
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f99acb60-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/f99dc910-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f99dc910-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8905b615076d7d00bcb72546139b057ec36db5b4
--- /dev/null
+++ b/graph/incidents_graphml/f/f99dc910-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.108
+ 100.64.79.108
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f99dc910-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f9a56a30-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f9a56a30-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e9208248b51709b8627136c99874eeba3bd1d93
--- /dev/null
+++ b/graph/incidents_graphml/f/f9a56a30-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.108
+ 100.64.79.108
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662257526
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9a56a30-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/f9a7a530-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f9a7a530-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc7a38f79b2c2cfb3e90413a270cef7da4d99732
--- /dev/null
+++ b/graph/incidents_graphml/f/f9a7a530-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.65
+ 100.64.16.65
+ []
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685598097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9a7a530-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/f9b1aff0-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f9b1aff0-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7042e4a451bc54a4ccc7733c935bc4ee7ba793ad
--- /dev/null
+++ b/graph/incidents_graphml/f/f9b1aff0-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.55
+ 100.64.79.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ USER-0015-1612.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657950533
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9b1aff0-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950533
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9b1aff0-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/f9b52da0-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/f9b52da0-68d4-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17042677249be66d2eeb8e9c7323de53a90a816d
--- /dev/null
+++ b/graph/incidents_graphml/f/f9b52da0-68d4-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.50
+ 100.64.41.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697097442
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9b52da0-68d4-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/f/f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41151b5f1d323003b04553cbd6b456104a8870d3
--- /dev/null
+++ b/graph/incidents_graphml/f/f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.180
+ 100.64.46.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295011
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb4e1daf86c87546236ecf425b3b3e34ebe07480
--- /dev/null
+++ b/graph/incidents_graphml/f/f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f9ba5540-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f9ba5540-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e2eff93e76765c740a965b85130a4925334dff5
--- /dev/null
+++ b/graph/incidents_graphml/f/f9ba5540-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.122
+ 100.64.39.122
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696466512
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9ba5540-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/f/f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd1161f1147cea8d54f76e49cc5e9b3138514ecb
--- /dev/null
+++ b/graph/incidents_graphml/f/f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f.graphml
@@ -0,0 +1,133 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.161
+ 100.64.23.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.70.11
+ 100.64.70.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1711473986
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473986
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473986
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473986
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f
+
+
+ INCIDENT_LINK
+ 1711473986
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f
+
+
+
diff --git a/graph/incidents_graphml/f/f9c2a740-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f9c2a740-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b09d7f4d64053a1125a6851444e744c432e585a
--- /dev/null
+++ b/graph/incidents_graphml/f/f9c2a740-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.16.65
+ 100.64.16.65
+ []
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685598097
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9c2a740-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/f9c31050-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/f9c31050-68d4-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6676f4e31980012f41899a4f7b53529023a9615b
--- /dev/null
+++ b/graph/incidents_graphml/f/f9c31050-68d4-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.50
+ 100.64.41.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697097442
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9c31050-68d4-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/f/f9c636b0-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f9c636b0-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edc7bf0fc0b8543d44e893137b745d71a9600de0
--- /dev/null
+++ b/graph/incidents_graphml/f/f9c636b0-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.148
+ 100.64.7.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274097
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9c636b0-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..925f4819621830d75a23385f183c79ccd84e6dc6
--- /dev/null
+++ b/graph/incidents_graphml/f/f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295011
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f9c72680-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f9c72680-6317-11ee-bf7a-9334ddba6edc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a96dbd94167e4c9581c4ab8efb2973cabc0b945
--- /dev/null
+++ b/graph/incidents_graphml/f/f9c72680-6317-11ee-bf7a-9334ddba6edc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.39.122
+ 100.64.39.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696466512
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9c72680-6317-11ee-bf7a-9334ddba6edc
+
+
+
diff --git a/graph/incidents_graphml/f/f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09a9b219f35cbdd0f46c28c39a4326945a882fc1
--- /dev/null
+++ b/graph/incidents_graphml/f/f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.105
+ 100.64.57.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695815824
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/f9d19f90-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f9d19f90-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..754e6d9393f9f26df923cbba92cc2aa0786650c7
--- /dev/null
+++ b/graph/incidents_graphml/f/f9d19f90-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.199
+ 100.64.37.199
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718075781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9d19f90-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/f/f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc15e92ff535a59035513ca4cc70b93ece088ba5
--- /dev/null
+++ b/graph/incidents_graphml/f/f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.54
+ USER-0015-1536.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.40.236
+ 100.64.40.236
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.26.177
+ 100.64.26.177
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.230
+ 100.64.69.230
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+ INCIDENT_LINK
+ 1713663561
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda
+
+
+
diff --git a/graph/incidents_graphml/f/f9d43650-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9d43650-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e97f4e7257e197fdcc5456e2d0a74b378a37b3b
--- /dev/null
+++ b/graph/incidents_graphml/f/f9d43650-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.182
+ 100.64.46.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295011
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9d43650-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f9d46780-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f9d46780-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f10d145522d276758201fbc491162378b3b4913
--- /dev/null
+++ b/graph/incidents_graphml/f/f9d46780-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.148
+ 100.64.7.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274097
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9d46780-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/f9daa150-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/f9daa150-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7867057291cd61dde4424a41b7e52e131e6d521a
--- /dev/null
+++ b/graph/incidents_graphml/f/f9daa150-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.21
+ 100.64.16.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753942
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9daa150-4153-11ee-b2c3-cd25671e6ae8
+
+
+ INCIDENT_LINK
+ 1692753942
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9daa150-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/f9e00150-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f9e00150-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e626bb7c9a869780973754c47638747e60eaed9
--- /dev/null
+++ b/graph/incidents_graphml/f/f9e00150-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.188
+ 100.64.24.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084918
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9e00150-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4027d2742301e7406e80539412cac0a9ec3b8a3f
--- /dev/null
+++ b/graph/incidents_graphml/f/f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.182
+ 100.64.46.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697295011
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1
+
+
+
diff --git a/graph/incidents_graphml/f/f9e98830-70e4-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/f/f9e98830-70e4-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0df66935663690ade26e30610ce2fbb0c05f3d3e
--- /dev/null
+++ b/graph/incidents_graphml/f/f9e98830-70e4-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.72
+ 100.64.68.72
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.73
+ 100.64.68.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.29.154
+ 100.64.29.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697983924
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ f9e98830-70e4-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/f/f9eb2a00-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f9eb2a00-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab20bec3dd33b292d3006c29caa0909d646457cd
--- /dev/null
+++ b/graph/incidents_graphml/f/f9eb2a00-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.16
+ 100.64.91.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1675055241
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9eb2a00-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/f9eba180-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f9eba180-22b8-11ee-8861-516dde03d998.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a322261318ebba5e218b85da4b4eb0f331783e61
--- /dev/null
+++ b/graph/incidents_graphml/f/f9eba180-22b8-11ee-8861-516dde03d998.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689388835
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ f9eba180-22b8-11ee-8861-516dde03d998
+
+
+
diff --git a/graph/incidents_graphml/f/f9f06020-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f9f06020-594c-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8857dd547548cae16038628516f767ca635309d4
--- /dev/null
+++ b/graph/incidents_graphml/f/f9f06020-594c-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.115
+ 100.64.71.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.49
+ 100.64.1.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.18.227
+ 100.64.18.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1667242266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9f06020-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9f06020-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9f06020-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ f9f06020-594c-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/f/f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a58ff30887f26674decb8a93095878e2f00f8e9
--- /dev/null
+++ b/graph/incidents_graphml/f/f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.116
+ 100.64.71.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.117
+ 100.64.71.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1667242266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/f/f9f4c490-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f9f4c490-1f1b-11ee-9e2e-57c890ee02a2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c66a71bb1d8e0c0926a8f70f4c73d23c4ee2933
--- /dev/null
+++ b/graph/incidents_graphml/f/f9f4c490-1f1b-11ee-9e2e-57c890ee02a2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.73
+ 100.64.47.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688991551
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9f4c490-1f1b-11ee-9e2e-57c890ee02a2
+
+
+
diff --git a/graph/incidents_graphml/f/f9f710e0-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f9f710e0-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2748d5dcb302c957f1b23008677c17ef6bdf296
--- /dev/null
+++ b/graph/incidents_graphml/f/f9f710e0-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.16
+ 100.64.91.16
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675055241
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9f710e0-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/f9ff9740-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f9ff9740-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a63f2a2d4525020a5d42aabc06f41e920937e6d
--- /dev/null
+++ b/graph/incidents_graphml/f/f9ff9740-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.188
+ 100.64.24.188
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084918
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ f9ff9740-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/fa00fea0-1403-11ed-91bb-5f4a5e1f0902.graphml b/graph/incidents_graphml/f/fa00fea0-1403-11ed-91bb-5f4a5e1f0902.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e3098ccdf1dfc187ad26e422d1d89ab52538cfe
--- /dev/null
+++ b/graph/incidents_graphml/f/fa00fea0-1403-11ed-91bb-5f4a5e1f0902.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.252
+ 100.64.70.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659624283
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa00fea0-1403-11ed-91bb-5f4a5e1f0902
+
+
+ INCIDENT_LINK
+ 1659624283
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa00fea0-1403-11ed-91bb-5f4a5e1f0902
+
+
+
diff --git a/graph/incidents_graphml/f/fa0721c0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/fa0721c0-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e34c82082d01db8c21bc85a8a5783f13dae6e99
--- /dev/null
+++ b/graph/incidents_graphml/f/fa0721c0-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.165
+ 100.64.32.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178154
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa0721c0-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/fa0f1ba0-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/f/fa0f1ba0-9e15-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf9e45c4f1c5351eec41222ac09060c1613d597b
--- /dev/null
+++ b/graph/incidents_graphml/f/fa0f1ba0-9e15-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.156
+ 100.64.70.156
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.157
+ 100.64.70.157
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.38.42
+ 100.64.38.42
+ ["Exploiting Host"]
+ 0.6203125
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.158
+ 100.64.70.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.159
+ 100.64.70.159
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.70.160
+ 100.64.70.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.174
+ 100.64.8.174
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952772
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f1ba0-9e15-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/f/fa0f9a30-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/f/fa0f9a30-1c97-11ee-b9c1-8f183b2e0424.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2916e79f61ea89f8c3613c5cfc02660a70f97c22
--- /dev/null
+++ b/graph/incidents_graphml/f/fa0f9a30-1c97-11ee-b9c1-8f183b2e0424.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688714955
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f9a30-1c97-11ee-b9c1-8f183b2e0424
+
+
+ INCIDENT_LINK
+ 1688714955
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa0f9a30-1c97-11ee-b9c1-8f183b2e0424
+
+
+
diff --git a/graph/incidents_graphml/f/fa10ae60-9998-11ee-9c88-85e8bec5492c.graphml b/graph/incidents_graphml/f/fa10ae60-9998-11ee-9c88-85e8bec5492c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7eba22cf604e09fa8a65cde9410f593fd2d9a81e
--- /dev/null
+++ b/graph/incidents_graphml/f/fa10ae60-9998-11ee-9c88-85e8bec5492c.graphml
@@ -0,0 +1,797 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.203
+ 100.64.52.203
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.204
+ 100.64.52.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.205
+ 100.64.52.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.154
+ USER-0015-1234.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.223
+ 100.64.22.223
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.188
+ 100.64.19.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.206
+ 100.64.52.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.207
+ 100.64.52.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.141
+ 100.64.35.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.29
+ 100.64.23.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.208
+ 100.64.52.208
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.209
+ 100.64.52.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.210
+ 100.64.52.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+ INCIDENT_LINK
+ 1702459280
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa10ae60-9998-11ee-9c88-85e8bec5492c
+
+
+
diff --git a/graph/incidents_graphml/f/fa21aea0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/fa21aea0-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac9b1288c1f14a59cd45cea318141fd9dd45fb15
--- /dev/null
+++ b/graph/incidents_graphml/f/fa21aea0-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.165
+ 100.64.32.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178154
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa21aea0-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/fa269a50-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/f/fa269a50-3249-11ef-8034-87bdea2d948c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92ea875352957cd9125ab48be686f8cc87710519
--- /dev/null
+++ b/graph/incidents_graphml/f/fa269a50-3249-11ef-8034-87bdea2d948c.graphml
@@ -0,0 +1,581 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.47
+ 100.64.20.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.26.80
+ 100.64.26.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.123
+ 100.64.96.123
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.124
+ 100.64.96.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.125
+ 100.64.96.125
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.193
+ 100.64.45.193
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.171
+ 100.64.30.171
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.126
+ USER-0015-2158.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.96.127
+ USER-0015-2159.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.202
+ 100.64.6.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa269a50-3249-11ef-8034-87bdea2d948c
+
+
+
diff --git a/graph/incidents_graphml/f/fa26c110-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fa26c110-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cf49efe005e8ab18fb6038d9efb66039f44f5fb
--- /dev/null
+++ b/graph/incidents_graphml/f/fa26c110-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa26c110-446a-11ee-9b56-b315e86f4666
+
+
+ INCIDENT_LINK
+ 1693093674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa26c110-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fa297df0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fa297df0-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43755d42c4d85b7a3711bab1f51e686ec6510a2c
--- /dev/null
+++ b/graph/incidents_graphml/f/fa297df0-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.186
+ 100.64.8.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855768
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa297df0-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/fa360350-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fa360350-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..935c9ac4f02ea038eb5c64850966442d465c0045
--- /dev/null
+++ b/graph/incidents_graphml/f/fa360350-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093675
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa360350-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d22292f745dcc05e9d2871316b945279d45c66c0
--- /dev/null
+++ b/graph/incidents_graphml/f/fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.100.124.228
+ 10.100.124.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Windows Active Directory"]
+
+
+ HOST
+ 100.64.0.196
+ 100.64.0.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687621027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621027
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+
diff --git a/graph/incidents_graphml/f/fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6.graphml b/graph/incidents_graphml/f/fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54d1c10eba5649f7265b050f27406c84a7768e79
--- /dev/null
+++ b/graph/incidents_graphml/f/fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.45
+ 100.64.28.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.46
+ 100.64.28.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.47
+ 100.64.28.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.175
+ 100.64.23.175
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+ INCIDENT_LINK
+ 1690158065
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6
+
+
+
diff --git a/graph/incidents_graphml/f/fa4ff860-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fa4ff860-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..300626e17f6deff54f95168399cddfad32ebf33c
--- /dev/null
+++ b/graph/incidents_graphml/f/fa4ff860-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.39
+ 100.64.34.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753943
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa4ff860-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fa567540-00b7-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/f/fa567540-00b7-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a972c0e44a4150aee957aa91b5cf8ea746a0f661
--- /dev/null
+++ b/graph/incidents_graphml/f/fa567540-00b7-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.6
+ 100.64.49.6
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1713797565
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa567540-00b7-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797565
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa567540-00b7-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797565
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa567540-00b7-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797565
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa567540-00b7-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/f/fa5683f0-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/f/fa5683f0-3249-11ef-8034-87bdea2d948c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e89c6405a9e3e94187f53648ee985356ec07968
--- /dev/null
+++ b/graph/incidents_graphml/f/fa5683f0-3249-11ef-8034-87bdea2d948c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.216.185
+ USER-0015-2160.example.internal
+ []
+ 0.4375
+ ["Precinct","Windows Active Directory"]
+
+
+ HOST
+ 172.18.12.139
+ 172.18.12.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 172.25.116.1
+ 172.25.116.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa5683f0-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa5683f0-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa5683f0-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247878
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa5683f0-3249-11ef-8034-87bdea2d948c
+
+
+
diff --git a/graph/incidents_graphml/f/fa5f88c0-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fa5f88c0-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..868134dd69d7c0ddbe3d417219904a6d9e0e11ac
--- /dev/null
+++ b/graph/incidents_graphml/f/fa5f88c0-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.39
+ 100.64.34.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753943
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa5f88c0-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fa654c90-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/fa654c90-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a7fd8c91a12528ec9a0566f1889d5abbd75e846
--- /dev/null
+++ b/graph/incidents_graphml/f/fa654c90-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.233
+ USER-0015-1210.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375356
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa654c90-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/f/fa72c2a0-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fa72c2a0-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..970b7f3749a33f911fe4f2d3368e39dd022e8a83
--- /dev/null
+++ b/graph/incidents_graphml/f/fa72c2a0-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.161
+ 100.64.23.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753943
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa72c2a0-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fa80c850-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/f/fa80c850-0c8d-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c604723f05b1af48a65ed8b6b19ea93a5ec4d4ef
--- /dev/null
+++ b/graph/incidents_graphml/f/fa80c850-0c8d-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,97 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.84.147.49
+ HOST-11973
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Windows Active Directory","Cortex XDR","Tenable Vulnerability Management"]
+
+
+ HOST
+ 100.64.69.57
+ 100.64.69.57
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ INCIDENT_LINK
+ 1686951442
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ fa80c850-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951442
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ fa80c850-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951442
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ fa80c850-0c8d-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/f/fa84bb70-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/fa84bb70-1068-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce40dae75f7c5c877e90ebf8424bc60f66aec3c7
--- /dev/null
+++ b/graph/incidents_graphml/f/fa84bb70-1068-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.233
+ USER-0015-1210.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687375356
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa84bb70-1068-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/f/fa88dea0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/f/fa88dea0-0c8d-11ee-af4a-2171e1d29da4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eee96b66e0958313638e61d3c8846793f190d638
--- /dev/null
+++ b/graph/incidents_graphml/f/fa88dea0-0c8d-11ee-af4a-2171e1d29da4.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.9
+ USER-0015-1517.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1686951442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa88dea0-0c8d-11ee-af4a-2171e1d29da4
+
+
+ INCIDENT_LINK
+ 1686951442
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa88dea0-0c8d-11ee-af4a-2171e1d29da4
+
+
+
diff --git a/graph/incidents_graphml/f/fa8d3030-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/fa8d3030-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5dc7feabea63a7c62cb5e5ad0bf6adb7925305ce
--- /dev/null
+++ b/graph/incidents_graphml/f/fa8d3030-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.13
+ 100.64.2.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fa8d3030-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f59fe8f577672c8b60212a01a6cd6e80faae471d
--- /dev/null
+++ b/graph/incidents_graphml/f/fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.117.96
+ 192.168.117.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.20
+ 100.64.80.20
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.21
+ 100.64.80.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686675706
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675706
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675706
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675706
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/f/fa9ad630-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fa9ad630-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d6401251b653340e33acd12ee71608292f236fc
--- /dev/null
+++ b/graph/incidents_graphml/f/fa9ad630-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.133
+ 100.64.58.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa9ad630-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fa9c4b60-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/fa9c4b60-6157-11ee-a94f-2f3b333c7157.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d00e32a79c1be116ab85802f17f8d4181315c2d0
--- /dev/null
+++ b/graph/incidents_graphml/f/fa9c4b60-6157-11ee-a94f-2f3b333c7157.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.13
+ 100.64.2.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696274099
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fa9c4b60-6157-11ee-a94f-2f3b333c7157
+
+
+
diff --git a/graph/incidents_graphml/f/fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e46fec95fdf6b43ea6a4d2033a7e28300aa0b17f
--- /dev/null
+++ b/graph/incidents_graphml/f/fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.11
+ 100.64.39.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801659
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fa9d59d0-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/fa9d59d0-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90c70ce2d441fabb7f0fe684b72a2050955073a8
--- /dev/null
+++ b/graph/incidents_graphml/f/fa9d59d0-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.164
+ 100.64.53.164
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fa9d59d0-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/fa9fa020-0a0a-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/fa9fa020-0a0a-11ee-9aea-c52880a9cb1e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c0d2358d1c1152454fce60834300297822118e4
--- /dev/null
+++ b/graph/incidents_graphml/f/fa9fa020-0a0a-11ee-9aea-c52880a9cb1e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.17.88.185
+ 10.17.88.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.15
+ 100.64.80.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1686675276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa9fa020-0a0a-11ee-9aea-c52880a9cb1e
+
+
+ INCIDENT_LINK
+ 1686675276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fa9fa020-0a0a-11ee-9aea-c52880a9cb1e
+
+
+
diff --git a/graph/incidents_graphml/f/faa86ad0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/faa86ad0-4e47-11ee-89ef-5bfd6850a1bd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..172d150badb0c197467215e99ab91550a41e85db
--- /dev/null
+++ b/graph/incidents_graphml/f/faa86ad0-4e47-11ee-89ef-5bfd6850a1bd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.167
+ 100.64.32.167
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694178155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ faa86ad0-4e47-11ee-89ef-5bfd6850a1bd
+
+
+
diff --git a/graph/incidents_graphml/f/faab02d0-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/faab02d0-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f684ded86ff488f068c807ba3f6532bd3ba77de6
--- /dev/null
+++ b/graph/incidents_graphml/f/faab02d0-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.133
+ 100.64.58.133
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020432
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ faab02d0-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/faad1140-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/faad1140-7500-11ee-861f-33fd57670a9d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ef087f57bdb634422f2ab635fe2d403ce718800a
--- /dev/null
+++ b/graph/incidents_graphml/f/faad1140-7500-11ee-861f-33fd57670a9d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.164
+ 100.64.53.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698435756
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ faad1140-7500-11ee-861f-33fd57670a9d
+
+
+
diff --git a/graph/incidents_graphml/f/faad3dc0-ff1f-11ed-9f06-15dc041567e3.graphml b/graph/incidents_graphml/f/faad3dc0-ff1f-11ed-9f06-15dc041567e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85603bee2e8d56e28f7a0759bd4da5a63ed7b039
--- /dev/null
+++ b/graph/incidents_graphml/f/faad3dc0-ff1f-11ed-9f06-15dc041567e3.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.219
+ 100.64.27.219
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.220
+ 100.64.27.220
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.221
+ 100.64.27.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.222
+ 100.64.27.222
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.223
+ 100.64.27.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.162
+ 100.64.3.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.224
+ 100.64.27.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.225
+ 100.64.27.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.226
+ 100.64.27.226
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faad3dc0-ff1f-11ed-9f06-15dc041567e3
+
+
+
diff --git a/graph/incidents_graphml/f/faadb1c0-dfa1-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/f/faadb1c0-dfa1-11ee-9120-ff7b7094ac3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2f58ee92e76ba93f637d119908440439f344278
--- /dev/null
+++ b/graph/incidents_graphml/f/faadb1c0-dfa1-11ee-9120-ff7b7094ac3d.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.253
+ 100.64.65.253
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.27.197
+ 100.64.27.197
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.49.145
+ 100.64.49.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710159728
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faadb1c0-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159728
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faadb1c0-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159728
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faadb1c0-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159728
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faadb1c0-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159728
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faadb1c0-dfa1-11ee-9120-ff7b7094ac3d
+
+
+ INCIDENT_LINK
+ 1710159728
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faadb1c0-dfa1-11ee-9120-ff7b7094ac3d
+
+
+
diff --git a/graph/incidents_graphml/f/fab049a0-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fab049a0-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82706c4c078ffb99d7ae4ef4dd4a608ccccdd256
--- /dev/null
+++ b/graph/incidents_graphml/f/fab049a0-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.11
+ 100.64.39.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fab049a0-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fab54570-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fab54570-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8b5dd4e279d1fbda7413520407b7a7daa7cbc68
--- /dev/null
+++ b/graph/incidents_graphml/f/fab54570-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.116
+ 100.64.55.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093675
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fab54570-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fab7d410-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fab7d410-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7223c1dfea7a06979278b14d7a3c252dd9740c8f
--- /dev/null
+++ b/graph/incidents_graphml/f/fab7d410-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.168
+ 100.64.30.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020432
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fab7d410-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fab96a20-505d-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/fab96a20-505d-11ee-a936-57e582280eb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..996e56ecaeb37973ecdd83e690553daaa644d907
--- /dev/null
+++ b/graph/incidents_graphml/f/fab96a20-505d-11ee-a936-57e582280eb3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694407506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fab96a20-505d-11ee-a936-57e582280eb3
+
+
+
diff --git a/graph/incidents_graphml/f/fabc1b10-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/fabc1b10-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c61bdea4b1417e53db7056602d8c1fbc2ed01ab
--- /dev/null
+++ b/graph/incidents_graphml/f/fabc1b10-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.56
+ 100.64.79.56
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.41
+ 100.64.72.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.57
+ 100.64.79.57
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657950535
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabc1b10-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950535
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabc1b10-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950535
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabc1b10-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950535
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabc1b10-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/fabd2b60-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fabd2b60-15b5-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..916ade3a88915fc9a19fd125d8fb5518e37fcadd
--- /dev/null
+++ b/graph/incidents_graphml/f/fabd2b60-15b5-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.127.220
+ 172.21.127.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.99
+ 100.64.95.99
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.100
+ 100.64.95.100
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.175
+ 100.64.86.175
+ ["Exploiting Target"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.22
+ 100.64.89.22
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105681
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fabd2b60-15b5-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/f/fac2c190-ff1f-11ed-9f06-15dc041567e3.graphml b/graph/incidents_graphml/f/fac2c190-ff1f-11ed-9f06-15dc041567e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdabb9bf0f6205f63f8b84fdfd4b66b8a7cb711d
--- /dev/null
+++ b/graph/incidents_graphml/f/fac2c190-ff1f-11ed-9f06-15dc041567e3.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.129
+ 100.64.18.129
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.126
+ 100.64.9.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.235
+ 100.64.27.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.236
+ 100.64.27.236
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.237
+ 100.64.27.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.68
+ 100.64.21.68
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.238
+ 100.64.27.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.239
+ 100.64.27.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.27.240
+ 100.64.27.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+ INCIDENT_LINK
+ 1685474833
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fac2c190-ff1f-11ed-9f06-15dc041567e3
+
+
+
diff --git a/graph/incidents_graphml/f/fac2f380-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fac2f380-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6586ab65584670578b13dc218979b47d81f1f49b
--- /dev/null
+++ b/graph/incidents_graphml/f/fac2f380-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.101
+ 100.64.11.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355177
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fac2f380-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/fac5e500-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fac5e500-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e50e8285919db3b974cf48aef80625572a1f8ba
--- /dev/null
+++ b/graph/incidents_graphml/f/fac5e500-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.163
+ 100.64.52.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855769
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fac5e500-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/fac604e0-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fac604e0-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..946d03e3acdb0d78fc2c474bf0b86a56eddeac26
--- /dev/null
+++ b/graph/incidents_graphml/f/fac604e0-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.168
+ 100.64.30.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fac604e0-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/faccec20-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/faccec20-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1928b8b7d225aa7799a23297d7a68cbae57fecef
--- /dev/null
+++ b/graph/incidents_graphml/f/faccec20-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.203
+ 100.64.8.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093676
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ faccec20-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fad09f20-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/fad09f20-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b75f49d24be39f65b0a18a4fd08f4924fdf67fb
--- /dev/null
+++ b/graph/incidents_graphml/f/fad09f20-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.103
+ 100.64.74.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688351173
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fad09f20-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/fad110d0-505d-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/fad110d0-505d-11ee-a936-57e582280eb3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..178fa580874c7da7b0507982399126859090c376
--- /dev/null
+++ b/graph/incidents_graphml/f/fad110d0-505d-11ee-a936-57e582280eb3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.102
+ 100.64.16.102
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694407506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fad110d0-505d-11ee-a936-57e582280eb3
+
+
+
diff --git a/graph/incidents_graphml/f/fadb68d0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fadb68d0-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..019ff1f1878daace7eddf37c34ecdf0cf6385a17
--- /dev/null
+++ b/graph/incidents_graphml/f/fadb68d0-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.163
+ 100.64.52.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855769
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fadb68d0-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/faeae5c0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/faeae5c0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a34b3210e4dbacb49364d420459474d99bab10b3
--- /dev/null
+++ b/graph/incidents_graphml/f/faeae5c0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924191
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ faeae5c0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/faf7af20-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/faf7af20-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc25c825697d03e37e18564d110cc6c240634a0d
--- /dev/null
+++ b/graph/incidents_graphml/f/faf7af20-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.103
+ 100.64.74.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688351173
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ faf7af20-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/faf9d250-71e1-11ed-b9a8-2b933f6712c2.graphml b/graph/incidents_graphml/f/faf9d250-71e1-11ed-b9a8-2b933f6712c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bef8eae20038699b85a189db5f0193b6cecd0567
--- /dev/null
+++ b/graph/incidents_graphml/f/faf9d250-71e1-11ed-b9a8-2b933f6712c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.103
+ 100.64.82.103
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.170
+ 100.64.72.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.82.104
+ 100.64.82.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1669945091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faf9d250-71e1-11ed-b9a8-2b933f6712c2
+
+
+ INCIDENT_LINK
+ 1669945091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faf9d250-71e1-11ed-b9a8-2b933f6712c2
+
+
+ INCIDENT_LINK
+ 1669945091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faf9d250-71e1-11ed-b9a8-2b933f6712c2
+
+
+ INCIDENT_LINK
+ 1669945091
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ faf9d250-71e1-11ed-b9a8-2b933f6712c2
+
+
+
diff --git a/graph/incidents_graphml/f/fafa4f10-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fafa4f10-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c59ecc321049866d0c41ae4031141e88ca417a2
--- /dev/null
+++ b/graph/incidents_graphml/f/fafa4f10-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.254
+ 100.64.7.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fafa4f10-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fb112420-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/fb112420-a79e-11ee-a7c6-87832a38b323.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..895042d89f2d2eb11b426bfbd556efa71f157156
--- /dev/null
+++ b/graph/incidents_graphml/f/fb112420-a79e-11ee-a7c6-87832a38b323.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.199
+ 100.64.10.199
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.200
+ 100.64.10.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.201
+ 100.64.10.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Azure Security"]
+
+
+ HOST
+ 100.64.10.202
+ 100.64.10.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.203
+ 100.64.10.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.204
+ 100.64.10.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.205
+ 100.64.10.205
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.206
+ 100.64.10.206
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.207
+ 100.64.10.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.208
+ 100.64.10.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.140
+ 100.64.3.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.209
+ 100.64.10.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.211
+ 100.64.10.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.212
+ 100.64.10.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.213
+ 100.64.10.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.214
+ 100.64.10.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+ INCIDENT_LINK
+ 1704001175
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb112420-a79e-11ee-a7c6-87832a38b323
+
+
+
diff --git a/graph/incidents_graphml/f/fb1eac30-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb1eac30-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ac73010bb9734c22dbcbd2563d55b51b3245dec
--- /dev/null
+++ b/graph/incidents_graphml/f/fb1eac30-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.80
+ 100.64.65.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020433
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb1eac30-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fb2f60f0-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/fb2f60f0-1948-11ee-8b71-f9525f65ac72.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e28bc0f24cc994cb43f7ac60f08d82fa5310f91a
--- /dev/null
+++ b/graph/incidents_graphml/f/fb2f60f0-1948-11ee-8b71-f9525f65ac72.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.105
+ 100.64.74.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688351174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb2f60f0-1948-11ee-8b71-f9525f65ac72
+
+
+
diff --git a/graph/incidents_graphml/f/fb308680-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb308680-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4be342a7050b051e1037e3d19a6cdaa7fe20d266
--- /dev/null
+++ b/graph/incidents_graphml/f/fb308680-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.80
+ 100.64.65.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb308680-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fb34a550-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fb34a550-15b5-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc2de5ebf1e2b8366595ab44e9d0877cd6da37a8
--- /dev/null
+++ b/graph/incidents_graphml/f/fb34a550-15b5-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.66.75
+ 172.31.66.75
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.86.147
+ 100.64.86.147
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1716105682
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb34a550-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105682
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb34a550-15b5-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/f/fb35c500-6e78-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/f/fb35c500-6e78-11ee-9076-51a308ac33b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7ab47c822b8f156fd26788efb4e63ca27d5dcdb
--- /dev/null
+++ b/graph/incidents_graphml/f/fb35c500-6e78-11ee-9076-51a308ac33b9.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.176
+ 100.64.15.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.177
+ 100.64.15.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.178
+ 100.64.15.178
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.179
+ 100.64.15.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.180
+ USER-0015-1207.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.181
+ 100.64.15.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.182
+ 100.64.15.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.183
+ 100.64.15.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.114
+ USER-0015-1204.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.184
+ 100.64.15.184
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.185
+ 100.64.15.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.186
+ 100.64.15.186
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.187
+ 100.64.15.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.188
+ 100.64.15.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.189
+ 100.64.15.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.190
+ 100.64.15.190
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.191
+ 100.64.15.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.192
+ 100.64.15.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.193
+ 100.64.15.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.194
+ 100.64.15.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+ INCIDENT_LINK
+ 1697717638
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb35c500-6e78-11ee-9076-51a308ac33b9
+
+
+
diff --git a/graph/incidents_graphml/f/fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/f/fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5a7fe256e6468985b1caa6b23afce792b7277e7
--- /dev/null
+++ b/graph/incidents_graphml/f/fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.62
+ 100.64.36.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.203
+ 100.64.39.203
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.65
+ 100.64.21.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.204
+ 100.64.39.204
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+ INCIDENT_LINK
+ 1686704483
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7
+
+
+
diff --git a/graph/incidents_graphml/f/fb384b30-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fb384b30-68d4-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c56e88e6e471cff889e7f2dae0390075d90218e3
--- /dev/null
+++ b/graph/incidents_graphml/f/fb384b30-68d4-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.52
+ 100.64.41.52
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697097445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb384b30-68d4-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/f/fb4287e0-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb4287e0-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66c33d0fa786f8f799aca37780bec6852f2e4fc8
--- /dev/null
+++ b/graph/incidents_graphml/f/fb4287e0-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.73
+ 100.64.19.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020433
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb4287e0-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fb47db90-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fb47db90-68d4-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..83f6c719725dbb8d4bbf02af1373f4f92caa2b9d
--- /dev/null
+++ b/graph/incidents_graphml/f/fb47db90-68d4-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.52
+ 100.64.41.52
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697097445
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb47db90-68d4-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/f/fb498c30-2303-11ef-b8e2-a700e0b31057.graphml b/graph/incidents_graphml/f/fb498c30-2303-11ef-b8e2-a700e0b31057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f9b2c79b8d58db1340b7cb494958d2f14be1983
--- /dev/null
+++ b/graph/incidents_graphml/f/fb498c30-2303-11ef-b8e2-a700e0b31057.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717568548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb498c30-2303-11ef-b8e2-a700e0b31057
+
+
+
diff --git a/graph/incidents_graphml/f/fb554c90-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb554c90-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b52350c98505a7afec49921e61ea9da664ced2fe
--- /dev/null
+++ b/graph/incidents_graphml/f/fb554c90-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.81
+ 100.64.65.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020433
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fb554c90-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fb587670-15b4-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fb587670-15b4-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a29176bee7a0597b1678a6a71a81cd9f48407fe
--- /dev/null
+++ b/graph/incidents_graphml/f/fb587670-15b4-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,243 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.73
+ 100.64.95.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.67.107
+ 100.64.67.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.229
+ 100.64.2.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.92
+ 100.64.65.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.131
+ 100.64.7.131
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.74
+ 100.64.95.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105252
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb587670-15b4-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/f/fb588050-2303-11ef-b8e2-a700e0b31057.graphml b/graph/incidents_graphml/f/fb588050-2303-11ef-b8e2-a700e0b31057.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0db23672f3f5271dd4e08f02690196cb11e2ae8
--- /dev/null
+++ b/graph/incidents_graphml/f/fb588050-2303-11ef-b8e2-a700e0b31057.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717568548
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb588050-2303-11ef-b8e2-a700e0b31057
+
+
+
diff --git a/graph/incidents_graphml/f/fb5dcec0-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fb5dcec0-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..171dec608cd8d50d3aa7f5f0137a4bf8c95132a1
--- /dev/null
+++ b/graph/incidents_graphml/f/fb5dcec0-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.95
+ 100.64.39.95
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920458
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb5dcec0-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fb638b40-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fb638b40-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c1401581243830cfbe2bb22aee5ef44aea31ad60
--- /dev/null
+++ b/graph/incidents_graphml/f/fb638b40-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.41
+ 100.64.34.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753945
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb638b40-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fb654ea0-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/f/fb654ea0-3fac-11ef-931a-1d289e4afac0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..078cadba6d78dc022ecab17b8513cb5b0c1b7e19
--- /dev/null
+++ b/graph/incidents_graphml/f/fb654ea0-3fac-11ef-931a-1d289e4afac0.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.156
+ 100.64.95.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.237
+ 100.64.45.237
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.1
+ 100.64.30.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.228
+ 100.64.3.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.157
+ 100.64.95.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.158
+ 100.64.95.158
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.159
+ 100.64.95.159
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.160
+ 100.64.95.160
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb654ea0-3fac-11ef-931a-1d289e4afac0
+
+
+
diff --git a/graph/incidents_graphml/f/fb6e8490-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/f/fb6e8490-9e15-11ee-a5ab-8550688be6fd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..957bed255a15ac0ae8c23cb2e8a2f139925726b2
--- /dev/null
+++ b/graph/incidents_graphml/f/fb6e8490-9e15-11ee-a5ab-8550688be6fd.graphml
@@ -0,0 +1,121 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.70.158
+ 100.64.70.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702952774
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fb6e8490-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952774
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fb6e8490-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952774
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fb6e8490-9e15-11ee-a5ab-8550688be6fd
+
+
+ INCIDENT_LINK
+ 1702952774
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fb6e8490-9e15-11ee-a5ab-8550688be6fd
+
+
+
diff --git a/graph/incidents_graphml/f/fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6.graphml b/graph/incidents_graphml/f/fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e5cc0f8791bdd7796271b287a03420d2fc0b012
--- /dev/null
+++ b/graph/incidents_graphml/f/fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6.graphml
@@ -0,0 +1,661 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.204
+ 100.64.40.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.205
+ 100.64.40.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.206
+ 100.64.40.206
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.207
+ 100.64.40.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.208
+ 100.64.40.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ HOST-2906
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.209
+ 100.64.40.209
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.52
+ 100.64.16.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.89
+ 100.64.12.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.210
+ 100.64.40.210
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.211
+ 100.64.40.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.212
+ 100.64.40.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.213
+ 100.64.40.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.214
+ 100.64.40.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+ INCIDENT_LINK
+ 1702598010
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6
+
+
+
diff --git a/graph/incidents_graphml/f/fb728f40-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fb728f40-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2dfce0e6dae626605acaf4f7745def325db824c7
--- /dev/null
+++ b/graph/incidents_graphml/f/fb728f40-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.97
+ 100.64.33.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920458
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb728f40-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fb73d840-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fb73d840-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5a95b1ff423d6061751ffcdf803c7a8a785ab0e
--- /dev/null
+++ b/graph/incidents_graphml/f/fb73d840-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.238
+ 100.64.8.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855770
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb73d840-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/fb742d10-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fb742d10-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9cedd030a088e47693f859d33869e99409ba780
--- /dev/null
+++ b/graph/incidents_graphml/f/fb742d10-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.41
+ 100.64.34.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753945
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb742d10-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fb7a0760-2df5-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/f/fb7a0760-2df5-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5335f7161fe7f746c48517f445b5462d7f289873
--- /dev/null
+++ b/graph/incidents_graphml/f/fb7a0760-2df5-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,367 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.1
+ 100.64.54.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.2
+ 100.64.54.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.128
+ 100.64.39.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.3
+ 100.64.54.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.4
+ 100.64.54.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.5
+ 100.64.54.5
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.6
+ 100.64.54.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.7
+ 100.64.54.7
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.8
+ 100.64.54.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+ INCIDENT_LINK
+ 1690624500
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb7a0760-2df5-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/f/fb7ea300-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/f/fb7ea300-3fac-11ef-931a-1d289e4afac0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91aae89833bdfd49b43d7788dd9eb68612c6b5c6
--- /dev/null
+++ b/graph/incidents_graphml/f/fb7ea300-3fac-11ef-931a-1d289e4afac0.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.156
+ USER-0015-2137.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.14.166
+ 100.64.14.166
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.76
+ USER-0015-2138.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.166
+ 100.64.95.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.167
+ 100.64.95.167
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+ INCIDENT_LINK
+ 1720719765
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb7ea300-3fac-11ef-931a-1d289e4afac0
+
+
+
diff --git a/graph/incidents_graphml/f/fb834190-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fb834190-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44988b0794b515de3cc08252a7a042db6e5c386b
--- /dev/null
+++ b/graph/incidents_graphml/f/fb834190-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.132
+ 100.64.7.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb834190-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c05ec889fa8c86fe56de661fb9391e21f062294
--- /dev/null
+++ b/graph/incidents_graphml/f/fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.132
+ 100.64.7.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695855770
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/f/fb92e890-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fb92e890-4d9c-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b886d73c6b98e14ef9ac724783bbd0ad688b043e
--- /dev/null
+++ b/graph/incidents_graphml/f/fb92e890-4d9c-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.88
+ 100.64.59.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694104712
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fb92e890-4d9c-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/f/fb969280-23a1-11ee-b3c4-1b81ee59f0d7.graphml b/graph/incidents_graphml/f/fb969280-23a1-11ee-b3c4-1b81ee59f0d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cc57dd901e6a52029e9614ed55de980ab3917ed
--- /dev/null
+++ b/graph/incidents_graphml/f/fb969280-23a1-11ee-b3c4-1b81ee59f0d7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.231
+ 100.64.24.231
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689488911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb969280-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488911
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fb969280-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+
diff --git a/graph/incidents_graphml/f/fb9de960-00b7-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/f/fb9de960-00b7-11ef-8b56-b9c5ad676a8a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dd09e2ada3ac235bd26f202ae40865c588468c8
--- /dev/null
+++ b/graph/incidents_graphml/f/fb9de960-00b7-11ef-8b56-b9c5ad676a8a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.110
+ 100.64.46.110
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1713797567
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb9de960-00b7-11ef-8b56-b9c5ad676a8a
+
+
+ INCIDENT_LINK
+ 1713797567
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fb9de960-00b7-11ef-8b56-b9c5ad676a8a
+
+
+
diff --git a/graph/incidents_graphml/f/fbaa2350-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fbaa2350-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7ac8bc98168586954fd7a41bc9104c08cdc2b9d
--- /dev/null
+++ b/graph/incidents_graphml/f/fbaa2350-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.236
+ 100.64.26.236
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020434
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbaa2350-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fbb5b0d0-2df5-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/f/fbb5b0d0-2df5-11ee-ad46-05b36c64c936.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..afd8e146acd90eb059f82027714bc70cde2421c2
--- /dev/null
+++ b/graph/incidents_graphml/f/fbb5b0d0-2df5-11ee-ad46-05b36c64c936.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.1
+ 100.64.54.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690624501
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbb5b0d0-2df5-11ee-ad46-05b36c64c936
+
+
+
diff --git a/graph/incidents_graphml/f/fbbaec30-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fbbaec30-7139-11ee-9ef2-d92876eea5ab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc95a41af03c7a88f3fc72fccbbf8c3e6f36ed9e
--- /dev/null
+++ b/graph/incidents_graphml/f/fbbaec30-7139-11ee-9ef2-d92876eea5ab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.122
+ 100.64.43.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698020434
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbbaec30-7139-11ee-9ef2-d92876eea5ab
+
+
+
diff --git a/graph/incidents_graphml/f/fbbb7c30-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fbbb7c30-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9c7d4f144e32290f7027bc88902df1def056c8d
--- /dev/null
+++ b/graph/incidents_graphml/f/fbbb7c30-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.127
+ 100.64.11.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924192
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbbb7c30-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fbc62170-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/fbc62170-01e1-11ef-a2c7-1dd1210cf0bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0636c6f301ab6417cab7e178d785ac6faa9788a5
--- /dev/null
+++ b/graph/incidents_graphml/f/fbc62170-01e1-11ef-a2c7-1dd1210cf0bf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713925557
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbc62170-01e1-11ef-a2c7-1dd1210cf0bf
+
+
+
diff --git a/graph/incidents_graphml/f/fbc65f20-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/fbc65f20-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..031d93c02605f5d21b057dcfa1ca797d3dbddb0b
--- /dev/null
+++ b/graph/incidents_graphml/f/fbc65f20-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.58
+ 100.64.79.58
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657950537
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbc65f20-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950537
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbc65f20-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/fbcac8b0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fbcac8b0-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed5f1d0374ef46e16bf14c1c285fb0928a88f9f8
--- /dev/null
+++ b/graph/incidents_graphml/f/fbcac8b0-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.241
+ 100.64.9.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015059
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbcac8b0-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fbcd2270-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/f/fbcd2270-29ad-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d768d02918a020adde5f700ca53b13c97b995122
--- /dev/null
+++ b/graph/incidents_graphml/f/fbcd2270-29ad-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.238
+ 100.64.19.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1690153772
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbcd2270-29ad-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690153772
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbcd2270-29ad-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/f/fbd04630-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/f/fbd04630-4522-11ef-b505-f5f313488713.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1818c9fdfdf7e80ea532b208402ce64330b03597
--- /dev/null
+++ b/graph/incidents_graphml/f/fbd04630-4522-11ef-b505-f5f313488713.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.241.150
+ USER-0015-2025.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.86.252
+ 100.64.86.252
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721320202
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbd04630-4522-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721320202
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbd04630-4522-11ef-b505-f5f313488713
+
+
+
diff --git a/graph/incidents_graphml/f/fbd55fd0-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/f/fbd55fd0-29ad-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab645c5ede42da4b56e622f9278b3df1940943ca
--- /dev/null
+++ b/graph/incidents_graphml/f/fbd55fd0-29ad-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.19.238
+ 100.64.19.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690153772
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fbd55fd0-29ad-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/f/fbd93440-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/fbd93440-01e1-11ef-a2c7-1dd1210cf0bf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b494e70032a9a3673fca8dbc0ea8289ddd8cfcb8
--- /dev/null
+++ b/graph/incidents_graphml/f/fbd93440-01e1-11ef-a2c7-1dd1210cf0bf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.151
+ 100.64.39.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713925557
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbd93440-01e1-11ef-a2c7-1dd1210cf0bf
+
+
+
diff --git a/graph/incidents_graphml/f/fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90ce9cc60730d51662345b922999012c3a220109
--- /dev/null
+++ b/graph/incidents_graphml/f/fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.159
+ 100.64.9.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/fbdc5f80-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/fbdc5f80-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..900c333d445cb3b18757c38e496374af064a139d
--- /dev/null
+++ b/graph/incidents_graphml/f/fbdc5f80-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.7.67
+ 100.64.7.67
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685598101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fbdc5f80-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/fbe17e50-ffeb-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/f/fbe17e50-ffeb-11ed-97eb-05d23f72b81e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6718c66f9d04113c4fcbbb007718eabbfa1874ea
--- /dev/null
+++ b/graph/incidents_graphml/f/fbe17e50-ffeb-11ed-97eb-05d23f72b81e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.44.245
+ 100.64.44.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685562452
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbe17e50-ffeb-11ed-97eb-05d23f72b81e
+
+
+
diff --git a/graph/incidents_graphml/f/fbe20a10-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fbe20a10-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a89c51fbf329b940c191519a1231b9fb7563605
--- /dev/null
+++ b/graph/incidents_graphml/f/fbe20a10-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.231
+ 100.64.10.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753945
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbe20a10-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fbe26810-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fbe26810-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17c795dd09ce19a8f5624455a042a8f83d9b4500
--- /dev/null
+++ b/graph/incidents_graphml/f/fbe26810-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.97
+ 100.64.39.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920459
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbe26810-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a8250f71f6609ff406a8e99e6dd3e0f7774f31b
--- /dev/null
+++ b/graph/incidents_graphml/f/fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.14
+ 100.64.9.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fbe96db0-1403-11ed-91bb-5f4a5e1f0902.graphml b/graph/incidents_graphml/f/fbe96db0-1403-11ed-91bb-5f4a5e1f0902.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..535a9dfc88c81a6ec942eac5da5c736e43667fc3
--- /dev/null
+++ b/graph/incidents_graphml/f/fbe96db0-1403-11ed-91bb-5f4a5e1f0902.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.5
+ 100.64.76.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.6
+ 100.64.76.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659624286
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbe96db0-1403-11ed-91bb-5f4a5e1f0902
+
+
+ INCIDENT_LINK
+ 1659624286
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbe96db0-1403-11ed-91bb-5f4a5e1f0902
+
+
+
diff --git a/graph/incidents_graphml/f/fbe9c880-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/fbe9c880-06e3-11ef-a25f-979d2687f044.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50f221c4ce35d396e9394ccff042c93521fb1297
--- /dev/null
+++ b/graph/incidents_graphml/f/fbe9c880-06e3-11ef-a25f-979d2687f044.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.63
+ 100.64.17.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714476172
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbe9c880-06e3-11ef-a25f-979d2687f044
+
+
+
diff --git a/graph/incidents_graphml/f/fbf26da0-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fbf26da0-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff6c7a7b38dab9d1da51c92a68e10fdac2849d21
--- /dev/null
+++ b/graph/incidents_graphml/f/fbf26da0-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.97
+ 100.64.39.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920459
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbf26da0-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fbf51730-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fbf51730-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66775e62e6e1d63a0a7428982c8d07a289aca3e6
--- /dev/null
+++ b/graph/incidents_graphml/f/fbf51730-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.132
+ 100.64.49.132
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488191
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbf51730-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccb8d881c2ee2d5ac05a5a455232dff336679f11
--- /dev/null
+++ b/graph/incidents_graphml/f/fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.96
+ 100.64.28.96
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801661
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fbf71e30-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/fbf71e30-1445-11ef-8b63-6b6087068682.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69cfbfa45f13792440ec7ebb1ebc55c5a9c95c89
--- /dev/null
+++ b/graph/incidents_graphml/f/fbf71e30-1445-11ef-8b63-6b6087068682.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.106
+ 100.64.47.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715947628
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbf71e30-1445-11ef-8b63-6b6087068682
+
+
+
diff --git a/graph/incidents_graphml/f/fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..434b29758f1de1a39c62896d5b1bf5caf3d7ef56
--- /dev/null
+++ b/graph/incidents_graphml/f/fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.159
+ 100.64.9.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691084921
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90
+
+
+
diff --git a/graph/incidents_graphml/f/fbfb5930-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/fbfb5930-003e-11ee-a334-5be386c18109.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6db7cc0f29a2c2ab6f8f470948c6bf61e831b7fa
--- /dev/null
+++ b/graph/incidents_graphml/f/fbfb5930-003e-11ee-a334-5be386c18109.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.67
+ 100.64.16.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685598101
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfb5930-003e-11ee-a334-5be386c18109
+
+
+
diff --git a/graph/incidents_graphml/f/fbfbcb70-683d-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/f/fbfbcb70-683d-11ed-96b7-d9d8859696d0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c14a9bf51bde376d8639ad16a54d6d40a42482a
--- /dev/null
+++ b/graph/incidents_graphml/f/fbfbcb70-683d-11ed-96b7-d9d8859696d0.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.40
+ 100.64.71.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.91
+ 100.64.73.91
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.33.67
+ 100.64.33.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1668885094
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfbcb70-683d-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885094
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfbcb70-683d-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885094
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfbcb70-683d-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885094
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfbcb70-683d-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885094
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfbcb70-683d-11ed-96b7-d9d8859696d0
+
+
+ INCIDENT_LINK
+ 1668885094
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfbcb70-683d-11ed-96b7-d9d8859696d0
+
+
+
diff --git a/graph/incidents_graphml/f/fbfdcb50-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/f/fbfdcb50-3249-11ef-8034-87bdea2d948c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e033b6eefaa1bdb9a962325024368576bb79ee15
--- /dev/null
+++ b/graph/incidents_graphml/f/fbfdcb50-3249-11ef-8034-87bdea2d948c.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.96.133
+ 100.64.96.133
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.96.134
+ 100.64.96.134
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719247881
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfdcb50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247881
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfdcb50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247881
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfdcb50-3249-11ef-8034-87bdea2d948c
+
+
+ INCIDENT_LINK
+ 1719247881
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fbfdcb50-3249-11ef-8034-87bdea2d948c
+
+
+
diff --git a/graph/incidents_graphml/f/fbff8d10-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fbff8d10-4d9c-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a28cab28e9a7f4facc1c9cae2bc62132f3717cae
--- /dev/null
+++ b/graph/incidents_graphml/f/fbff8d10-4d9c-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.207
+ 100.64.14.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694104713
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fbff8d10-4d9c-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/f/fc02ad00-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fc02ad00-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..236e20b34e257d328e1a001617a1e6e3e008faba
--- /dev/null
+++ b/graph/incidents_graphml/f/fc02ad00-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.120
+ 100.64.55.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc02ad00-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fc061d50-ffeb-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/f/fc061d50-ffeb-11ed-97eb-05d23f72b81e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2c8b2ed5995a2e2f8bfbbb24fc908b6760a1156
--- /dev/null
+++ b/graph/incidents_graphml/f/fc061d50-ffeb-11ed-97eb-05d23f72b81e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.131
+ 100.64.37.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685562453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc061d50-ffeb-11ed-97eb-05d23f72b81e
+
+
+
diff --git a/graph/incidents_graphml/f/fc07b4d0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fc07b4d0-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b46b4c0d81c9698b448760b3e4984c3195794bf0
--- /dev/null
+++ b/graph/incidents_graphml/f/fc07b4d0-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.132
+ 100.64.49.132
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc07b4d0-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fc0cd8a0-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/fc0cd8a0-1145-11ee-aac5-6731911fd461.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd84b89c91f24ea2cd604734248ae5b4b8c70b92
--- /dev/null
+++ b/graph/incidents_graphml/f/fc0cd8a0-1145-11ee-aac5-6731911fd461.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.107
+ 100.64.10.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.2
+ 100.64.71.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687470277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc0cd8a0-1145-11ee-aac5-6731911fd461
+
+
+ INCIDENT_LINK
+ 1687470277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc0cd8a0-1145-11ee-aac5-6731911fd461
+
+
+
diff --git a/graph/incidents_graphml/f/fc0d94b0-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/f/fc0d94b0-435e-11ef-9e66-fd84d5bf3736.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b6097f93b27c4c172334f6093858654cc11db8d8
--- /dev/null
+++ b/graph/incidents_graphml/f/fc0d94b0-435e-11ef-9e66-fd84d5bf3736.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.73
+ 100.64.28.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.74
+ 100.64.28.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721126070
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc0d94b0-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126070
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc0d94b0-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126070
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc0d94b0-435e-11ef-9e66-fd84d5bf3736
+
+
+ INCIDENT_LINK
+ 1721126070
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc0d94b0-435e-11ef-9e66-fd84d5bf3736
+
+
+
diff --git a/graph/incidents_graphml/f/fc0e35d0-752a-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/f/fc0e35d0-752a-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4fc230fc055f14df836e4d164ad5b8833289884
--- /dev/null
+++ b/graph/incidents_graphml/f/fc0e35d0-752a-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.138
+ 100.64.21.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc0e35d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/f/fc114050-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fc114050-4d9c-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3faba9f8a070a641462efcc11648de6483212233
--- /dev/null
+++ b/graph/incidents_graphml/f/fc114050-4d9c-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.207
+ 100.64.14.207
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694104713
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc114050-4d9c-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/f/fc14c460-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fc14c460-12a4-11ee-ab1f-2bdb6669e8cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb6a982d0edff97f6dc89943e67fe188fd6dc270
--- /dev/null
+++ b/graph/incidents_graphml/f/fc14c460-12a4-11ee-ab1f-2bdb6669e8cc.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.179
+ 100.64.33.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc14c460-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc14c460-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+
diff --git a/graph/incidents_graphml/f/fc152390-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fc152390-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3feb1a808982497fac18a6c2e897d1ce3e2a07ae
--- /dev/null
+++ b/graph/incidents_graphml/f/fc152390-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.120
+ 100.64.55.120
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093678
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc152390-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/f/fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3d89754a77c3fe1b754be5a9f38629a79bbe1a8
--- /dev/null
+++ b/graph/incidents_graphml/f/fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.138
+ 100.64.21.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/f/fc1efc80-ffeb-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/f/fc1efc80-ffeb-11ed-97eb-05d23f72b81e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8045a54590e450a2ccb255639e68ae36d6c0de64
--- /dev/null
+++ b/graph/incidents_graphml/f/fc1efc80-ffeb-11ed-97eb-05d23f72b81e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.37.131
+ 100.64.37.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685562453
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc1efc80-ffeb-11ed-97eb-05d23f72b81e
+
+
+
diff --git a/graph/incidents_graphml/f/fc203880-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fc203880-0b1a-11ef-9e64-a71223ce0876.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..532a99741eb2264f8d0ce618f4ac4f67daf833ef
--- /dev/null
+++ b/graph/incidents_graphml/f/fc203880-0b1a-11ef-9e64-a71223ce0876.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.248
+ USER-0015-1255.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1999.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1714939599
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc203880-0b1a-11ef-9e64-a71223ce0876
+
+
+
diff --git a/graph/incidents_graphml/f/fc20cdb0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc20cdb0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9531112ebc51a85815bd2e11f0b6b34b55e0b8b4
--- /dev/null
+++ b/graph/incidents_graphml/f/fc20cdb0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc20cdb0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fc2b81d0-752a-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/f/fc2b81d0-752a-11ee-97b8-bd3e826c3a7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b86864e0000584db4fcf5fb60707df38098f0f2
--- /dev/null
+++ b/graph/incidents_graphml/f/fc2b81d0-752a-11ee-97b8-bd3e826c3a7b.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.140
+ 100.64.21.140
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.141
+ 100.64.21.141
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.142
+ 100.64.21.142
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.143
+ 100.64.21.143
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.144
+ 100.64.21.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.128
+ 100.64.15.128
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.165
+ 100.64.10.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.145
+ 100.64.21.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.13
+ 100.64.11.13
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.146
+ 100.64.21.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.147
+ 100.64.21.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.148
+ 100.64.21.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.149
+ 100.64.21.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.150
+ 100.64.21.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.151
+ 100.64.21.151
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.152
+ 100.64.21.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.153
+ 100.64.21.153
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.154
+ 100.64.21.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.155
+ 100.64.21.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+ INCIDENT_LINK
+ 1698453797
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc2b81d0-752a-11ee-97b8-bd3e826c3a7b
+
+
+
diff --git a/graph/incidents_graphml/f/fc2e44b0-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/f/fc2e44b0-4522-11ef-b505-f5f313488713.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e53dee471ad291b4c0a940d48ba90e2709867e20
--- /dev/null
+++ b/graph/incidents_graphml/f/fc2e44b0-4522-11ef-b505-f5f313488713.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ USER-0015-1979.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.16
+ USER-0015-2026.example.internal
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.46.208
+ USER-0015-1982.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1721320203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc2e44b0-4522-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721320203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc2e44b0-4522-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721320203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc2e44b0-4522-11ef-b505-f5f313488713
+
+
+ INCIDENT_LINK
+ 1721320203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc2e44b0-4522-11ef-b505-f5f313488713
+
+
+
diff --git a/graph/incidents_graphml/f/fc2f7700-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/fc2f7700-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d68320b8632245cac168eeccb29cb4da57da6b0
--- /dev/null
+++ b/graph/incidents_graphml/f/fc2f7700-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.39
+ 100.64.23.39
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368161
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc2f7700-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/f/fc320bc0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc320bc0-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d497711517de95b2fa73b392e5fb4934d096e49
--- /dev/null
+++ b/graph/incidents_graphml/f/fc320bc0-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.36
+ 100.64.30.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924193
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc320bc0-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fc336900-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc336900-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c99cf3b1bcdbf4b39663c2bf42ddc06f7e5db13
--- /dev/null
+++ b/graph/incidents_graphml/f/fc336900-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.10
+ 100.64.94.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc336900-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc3ab560-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/fc3ab560-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28d27695c79960192baf69cbfe056bd685eba143
--- /dev/null
+++ b/graph/incidents_graphml/f/fc3ab560-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.182
+ 100.64.7.182
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc3ab560-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45fe99545bc79424ffcb227b94f192f03894085a
--- /dev/null
+++ b/graph/incidents_graphml/f/fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.65
+ 100.64.21.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.149
+ 100.64.71.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+
diff --git a/graph/incidents_graphml/f/fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6a831a10fc33edb75e76bfd2624f4dbb7a3d3d8
--- /dev/null
+++ b/graph/incidents_graphml/f/fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.10
+ 100.64.94.10
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc3fa050-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc3fa050-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0ce4063c12b463dff10a7295f7d29f90bb53062
--- /dev/null
+++ b/graph/incidents_graphml/f/fc3fa050-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.23
+ 100.64.2.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924193
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc3fa050-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fc3fa3a0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/fc3fa3a0-6232-11ee-a972-e59ec7ee05b9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbb98867619a91a6adb79b05200c19d356cfcd52
--- /dev/null
+++ b/graph/incidents_graphml/f/fc3fa3a0-6232-11ee-a972-e59ec7ee05b9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.39
+ 100.64.23.39
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696368161
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc3fa3a0-6232-11ee-a972-e59ec7ee05b9
+
+
+
diff --git a/graph/incidents_graphml/f/fc462db0-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc462db0-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b9f6f267e38d8c6a60a645e4d0a39cdffb066e0
--- /dev/null
+++ b/graph/incidents_graphml/f/fc462db0-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,173 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.14
+ 100.64.94.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc462db0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc462db0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc462db0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc462db0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc462db0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+ INCIDENT_LINK
+ 1660457939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc462db0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc49a980-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/fc49a980-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cdc89993b55b0d6c845bd5dbce85ad584161bf4b
--- /dev/null
+++ b/graph/incidents_graphml/f/fc49a980-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.182
+ 100.64.7.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882532
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc49a980-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f218c5dc66afe5bb89c9c5e4787a7c3ec035dc9
--- /dev/null
+++ b/graph/incidents_graphml/f/fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.14
+ 100.64.94.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660457940
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc4f5570-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc4f5570-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..734d52b7e426824dc8344fd1f15b23c99a86cc6d
--- /dev/null
+++ b/graph/incidents_graphml/f/fc4f5570-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.250
+ 100.64.23.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660457940
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc4f5570-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc51abf0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc51abf0-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38807de99bdf59fea0012952be2572323235df48
--- /dev/null
+++ b/graph/incidents_graphml/f/fc51abf0-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.238
+ 100.64.22.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc51abf0-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e.graphml b/graph/incidents_graphml/f/fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db9e7b0133de6423eb09201ab01a128d4806cae9
--- /dev/null
+++ b/graph/incidents_graphml/f/fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.58
+ 100.64.82.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690573391
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e
+
+
+
diff --git a/graph/incidents_graphml/f/fc55d270-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc55d270-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3fea4c99098250f3e97f755b0dd49500ee8a267e
--- /dev/null
+++ b/graph/incidents_graphml/f/fc55d270-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.9
+ 100.64.33.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465858
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc55d270-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/fc580800-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc580800-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..552a5083636df2252ef9f08f8a77d9b77abfd021
--- /dev/null
+++ b/graph/incidents_graphml/f/fc580800-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.23.250
+ 100.64.23.250
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660457940
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc580800-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc581160-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fc581160-0b1a-11ef-9e64-a71223ce0876.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..630eaa4d9e4d3b30da25cfc395bfcdf6fa1d1a59
--- /dev/null
+++ b/graph/incidents_graphml/f/fc581160-0b1a-11ef-9e64-a71223ce0876.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.15.1
+ 100.64.15.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714939600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc581160-0b1a-11ef-9e64-a71223ce0876
+
+
+
diff --git a/graph/incidents_graphml/f/fc599e40-5ce2-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/f/fc599e40-5ce2-11ee-888f-c5a21ae2b888.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..557ca6bd204f01b4ae493e191e099baba2f1aec7
--- /dev/null
+++ b/graph/incidents_graphml/f/fc599e40-5ce2-11ee-888f-c5a21ae2b888.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.81
+ 100.64.33.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.81
+ 100.64.44.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.82
+ 100.64.44.82
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695784046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc599e40-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc599e40-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc599e40-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc599e40-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc599e40-5ce2-11ee-888f-c5a21ae2b888
+
+
+ INCIDENT_LINK
+ 1695784046
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc599e40-5ce2-11ee-888f-c5a21ae2b888
+
+
+
diff --git a/graph/incidents_graphml/f/fc5cc540-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc5cc540-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91b5bb82be664eeec8ee27b246799f2af2e104d6
--- /dev/null
+++ b/graph/incidents_graphml/f/fc5cc540-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.97
+ 100.64.56.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc5cc540-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fc5d3820-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc5d3820-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..374b697fb711202046af6ee0008aa02a4e7ab2c3
--- /dev/null
+++ b/graph/incidents_graphml/f/fc5d3820-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.31
+ 100.64.91.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1660457940
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc5d3820-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc631110-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc631110-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6f6b23c97f76ecd3ff4fdf0fe6d573bc1d43838
--- /dev/null
+++ b/graph/incidents_graphml/f/fc631110-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.238
+ 100.64.22.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc631110-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ee433536377da54d3a387bf2a234c3570baf664
--- /dev/null
+++ b/graph/incidents_graphml/f/fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.40
+ 100.64.79.40
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.38
+ 100.64.73.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.41
+ 100.64.79.41
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.42
+ 100.64.79.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+ INCIDENT_LINK
+ 1687621031
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc
+
+
+
diff --git a/graph/incidents_graphml/f/fc6821f0-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc6821f0-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0492293e93526d2cc6d1cf785e533669713c516d
--- /dev/null
+++ b/graph/incidents_graphml/f/fc6821f0-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.9
+ 100.64.33.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465858
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc6821f0-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/fc6834a0-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc6834a0-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20497e6715f0c7f41c08ccf3cc40065a7e3ee900
--- /dev/null
+++ b/graph/incidents_graphml/f/fc6834a0-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.91.31
+ 100.64.91.31
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660457940
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc6834a0-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fc6bb960-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc6bb960-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f6de19c64c174bd2c697dffdc56a139c88cbd979
--- /dev/null
+++ b/graph/incidents_graphml/f/fc6bb960-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.97
+ 100.64.56.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc6bb960-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fc70c8d0-4401-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/f/fc70c8d0-4401-11ee-b97c-f959f41b9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d4638d411ca137bfef8c1787e2e1b1df37580cc
--- /dev/null
+++ b/graph/incidents_graphml/f/fc70c8d0-4401-11ee-b97c-f959f41b9d07.graphml
@@ -0,0 +1,365 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.216
+ 100.64.20.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.239
+ 100.64.62.239
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.240
+ 100.64.62.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.195
+ 100.64.6.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.241
+ 100.64.62.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.247
+ 100.64.60.247
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.221
+ 100.64.14.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+ INCIDENT_LINK
+ 1693048581
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc70c8d0-4401-11ee-b97c-f959f41b9d07
+
+
+
diff --git a/graph/incidents_graphml/f/fc70f3c0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc70f3c0-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..277e3d9fd52dfa65c6de5a70ec2489298db7b58e
--- /dev/null
+++ b/graph/incidents_graphml/f/fc70f3c0-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.242
+ 100.64.22.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc70f3c0-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fc77b250-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc77b250-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8b0f8c499f50fdf04d0d09cce759774f7dd11e7
--- /dev/null
+++ b/graph/incidents_graphml/f/fc77b250-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.11
+ 100.64.33.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465858
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc77b250-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/fc7fe7e0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc7fe7e0-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0cd4e3a51af6fd1578646a6287eb26d1f9abb81
--- /dev/null
+++ b/graph/incidents_graphml/f/fc7fe7e0-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.242
+ 100.64.22.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc7fe7e0-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fc8a9e10-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc8a9e10-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc830ff987cd95effbff62d82a2846635a112924
--- /dev/null
+++ b/graph/incidents_graphml/f/fc8a9e10-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.11
+ 100.64.33.11
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465858
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc8a9e10-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/fc8dca90-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc8dca90-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f69459afb1b00da3fa3316f10ed9608f4d889d7
--- /dev/null
+++ b/graph/incidents_graphml/f/fc8dca90-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fc8dca90-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fc911870-f3cf-11ec-b969-4736ca05d771.graphml b/graph/incidents_graphml/f/fc911870-f3cf-11ec-b969-4736ca05d771.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30bfdeb4e0a4f396ad240328a597c170b4683800
--- /dev/null
+++ b/graph/incidents_graphml/f/fc911870-f3cf-11ec-b969-4736ca05d771.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.226
+ USER-0015-1606.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656083516
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc911870-f3cf-11ec-b969-4736ca05d771
+
+
+
diff --git a/graph/incidents_graphml/f/fc91ebb0-66fb-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/f/fc91ebb0-66fb-11ee-869c-79758109a47c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23be468b38e140b6e2ed5a994f4661128d977dfe
--- /dev/null
+++ b/graph/incidents_graphml/f/fc91ebb0-66fb-11ee-869c-79758109a47c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.119
+ 100.64.50.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696894295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc91ebb0-66fb-11ee-869c-79758109a47c
+
+
+
diff --git a/graph/incidents_graphml/f/fc944be0-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fc944be0-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f1bb4e1ab05c5d92f856c589e7fd70f3e6df62e
--- /dev/null
+++ b/graph/incidents_graphml/f/fc944be0-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801662
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc944be0-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fc969cf0-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fc969cf0-4d9c-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8050c53010b6ee376a16f519bdb1702a78568004
--- /dev/null
+++ b/graph/incidents_graphml/f/fc969cf0-4d9c-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.90
+ 100.64.59.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694104714
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc969cf0-4d9c-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/f/fc99f840-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fc99f840-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66b14a293775a5a6c2b4b4ac041fea005cd9cb1a
--- /dev/null
+++ b/graph/incidents_graphml/f/fc99f840-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.99
+ 100.64.39.99
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920460
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fc99f840-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fc9e6c60-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc9e6c60-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..783691de7084aac74cc6da796aad09a8058e5472
--- /dev/null
+++ b/graph/incidents_graphml/f/fc9e6c60-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.124
+ 100.64.10.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc9e6c60-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fc9f0b10-66fb-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/f/fc9f0b10-66fb-11ee-869c-79758109a47c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dd6066cedd3374dc42b1dbaed85860d73875b741
--- /dev/null
+++ b/graph/incidents_graphml/f/fc9f0b10-66fb-11ee-869c-79758109a47c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.50.119
+ 100.64.50.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1696894295
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fc9f0b10-66fb-11ee-869c-79758109a47c
+
+
+
diff --git a/graph/incidents_graphml/f/fc9f3f90-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fc9f3f90-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71618efceb9c88cbe736b9d2314129135a28ced1
--- /dev/null
+++ b/graph/incidents_graphml/f/fc9f3f90-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.43
+ 100.64.34.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753947
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc9f3f90-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fc9fa1b0-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fc9fa1b0-0b1a-11ef-9e64-a71223ce0876.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a77be12ff74667db9729a65149899ed50a18ed2
--- /dev/null
+++ b/graph/incidents_graphml/f/fc9fa1b0-0b1a-11ef-9e64-a71223ce0876.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.193
+ 100.64.45.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1714939600
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fc9fa1b0-0b1a-11ef-9e64-a71223ce0876
+
+
+
diff --git a/graph/incidents_graphml/f/fca93370-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fca93370-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bef1eb59aab12b34ee3ab2b3fb6404c7e378e8ab
--- /dev/null
+++ b/graph/incidents_graphml/f/fca93370-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.106
+ 100.64.20.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fca93370-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fca93a80-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fca93a80-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18014a2da49de68db249fd8a21a8e50794fdf8ac
--- /dev/null
+++ b/graph/incidents_graphml/f/fca93a80-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.99
+ 100.64.39.99
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920460
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fca93a80-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fcaac130-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fcaac130-4d9c-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a20f6742d3afd350b4f03cea6599e91fb95be73a
--- /dev/null
+++ b/graph/incidents_graphml/f/fcaac130-4d9c-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.92
+ 100.64.59.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694104714
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcaac130-4d9c-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/f/fcabd1b0-4f54-11ee-a8d7-55254673f433.graphml b/graph/incidents_graphml/f/fcabd1b0-4f54-11ee-a8d7-55254673f433.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..701099cbfd2c5d94a30121ab565a2b45e9115592
--- /dev/null
+++ b/graph/incidents_graphml/f/fcabd1b0-4f54-11ee-a8d7-55254673f433.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.172
+ 100.64.45.172
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694293693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcabd1b0-4f54-11ee-a8d7-55254673f433
+
+
+
diff --git a/graph/incidents_graphml/f/fcad8790-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fcad8790-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eadd94bbcb646b5fbb369286e7dc6651e05ea30c
--- /dev/null
+++ b/graph/incidents_graphml/f/fcad8790-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.244
+ 100.64.22.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcad8790-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..856d6d0192515a58aedd277c2fac5d00f1969992
--- /dev/null
+++ b/graph/incidents_graphml/f/fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.43
+ 100.64.34.43
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692753947
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8
+
+
+
diff --git a/graph/incidents_graphml/f/fcb2b480-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fcb2b480-0b1a-11ef-9e64-a71223ce0876.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48d8575ba39f297bf6eb21c2e2c26a4503817274
--- /dev/null
+++ b/graph/incidents_graphml/f/fcb2b480-0b1a-11ef-9e64-a71223ce0876.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.45.193
+ 100.64.45.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1714939600
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fcb2b480-0b1a-11ef-9e64-a71223ce0876
+
+
+
diff --git a/graph/incidents_graphml/f/fcb92100-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fcb92100-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9a91260f2e549ea5a5ce6e0661082d15384672e
--- /dev/null
+++ b/graph/incidents_graphml/f/fcb92100-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.177
+ 100.64.16.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fcb92100-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fcbc4d60-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fcbc4d60-4d9c-11ee-b83a-49677896a1e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d038535969aa8807e80f2aa9829119c03c097a96
--- /dev/null
+++ b/graph/incidents_graphml/f/fcbc4d60-4d9c-11ee-b83a-49677896a1e8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.92
+ 100.64.59.92
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694104714
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fcbc4d60-4d9c-11ee-b83a-49677896a1e8
+
+
+
diff --git a/graph/incidents_graphml/f/fcc5f190-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fcc5f190-14e2-11ef-be13-69fb87490927.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58096e45b2d1b006f1fd2e61705df53e5fe304f1
--- /dev/null
+++ b/graph/incidents_graphml/f/fcc5f190-14e2-11ef-be13-69fb87490927.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.244
+ 100.64.22.244
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716015060
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fcc5f190-14e2-11ef-be13-69fb87490927
+
+
+
diff --git a/graph/incidents_graphml/f/fccd6c50-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fccd6c50-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19e8a1265449e8c16ee3a23f86a8f9bcb49b11df
--- /dev/null
+++ b/graph/incidents_graphml/f/fccd6c50-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.179
+ 100.64.16.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fccd6c50-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fccdffb0-4f54-11ee-a8d7-55254673f433.graphml b/graph/incidents_graphml/f/fccdffb0-4f54-11ee-a8d7-55254673f433.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94f38ee4fcef7c704ccc5ab1c30ba2f76bc99e8e
--- /dev/null
+++ b/graph/incidents_graphml/f/fccdffb0-4f54-11ee-a8d7-55254673f433.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.205
+ 100.64.45.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694293693
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fccdffb0-4f54-11ee-a8d7-55254673f433
+
+
+
diff --git a/graph/incidents_graphml/f/fcd034f0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fcd034f0-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cff39873cf0106e8b4c3f0b918c06be73942e88c
--- /dev/null
+++ b/graph/incidents_graphml/f/fcd034f0-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.134
+ 100.64.49.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcd034f0-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fcd1e3e0-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fcd1e3e0-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..337ee78a10a804a6e001af74c659768bfcbcd2db
--- /dev/null
+++ b/graph/incidents_graphml/f/fcd1e3e0-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.122
+ USER-0015-1412.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093679
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcd1e3e0-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fcd5c6d0-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/fcd5c6d0-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a60a8a0dd730d96b5a5c516bf123d75d04f3473
--- /dev/null
+++ b/graph/incidents_graphml/f/fcd5c6d0-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.91.18
+ 100.64.91.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1675055246
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcd5c6d0-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/fcde3530-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fcde3530-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27893e685697298e7b5c4178784d11415ffcc1f5
--- /dev/null
+++ b/graph/incidents_graphml/f/fcde3530-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.181
+ 100.64.16.181
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fcde3530-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fcde8cd0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fcde8cd0-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24203455274ec2c7f1cefac19d9706163eb5b359
--- /dev/null
+++ b/graph/incidents_graphml/f/fcde8cd0-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.134
+ 100.64.49.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fcde8cd0-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fce06630-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/fce06630-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25afaef87567609666ade6c87d91217e618739ae
--- /dev/null
+++ b/graph/incidents_graphml/f/fce06630-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,605 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.201
+ 100.64.37.201
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.202
+ 100.64.37.202
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.86
+ 100.64.15.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.95
+ 100.64.23.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.152
+ 100.64.22.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.203
+ 100.64.37.203
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.204
+ 100.64.37.204
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.54
+ 100.64.26.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.241
+ 100.64.2.241
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.138
+ 100.64.20.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.205
+ 100.64.37.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.160
+ 100.64.27.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.206
+ 100.64.37.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce06630-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/fce19b50-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fce19b50-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f34a19ea1769cbe5245af1510b4724c2bad5f17d
--- /dev/null
+++ b/graph/incidents_graphml/f/fce19b50-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.122
+ USER-0015-1412.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093679
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fce19b50-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fce1fbd0-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/fce1fbd0-a05b-11ed-9aec-656149dc5369.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c5b3844745548d25c48859c8e37a60a6525fb7f7
--- /dev/null
+++ b/graph/incidents_graphml/f/fce1fbd0-a05b-11ed-9aec-656149dc5369.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.84.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.18
+ 100.64.91.18
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675055246
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fce1fbd0-a05b-11ed-9aec-656149dc5369
+
+
+
diff --git a/graph/incidents_graphml/f/fce22aa0-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fce22aa0-68d4-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a05b8318211de5fd3a63bdacbc4398803340cd1f
--- /dev/null
+++ b/graph/incidents_graphml/f/fce22aa0-68d4-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.54
+ 100.64.41.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697097448
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fce22aa0-68d4-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/f/fceb0ff0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fceb0ff0-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4d556f2e038ecf018d0fdd2d4e719de336b0605
--- /dev/null
+++ b/graph/incidents_graphml/f/fceb0ff0-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.248
+ 100.64.33.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fceb0ff0-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fceefe10-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fceefe10-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2b248cb05cefe3af9ea061064ba1f7dc5628c94b
--- /dev/null
+++ b/graph/incidents_graphml/f/fceefe10-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.185
+ 100.64.16.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fceefe10-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fcf23030-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fcf23030-68d4-11ee-bfd3-8f3b77e847d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0de02e23b4b6b37acd0a0945ebf172c0cd34da9
--- /dev/null
+++ b/graph/incidents_graphml/f/fcf23030-68d4-11ee-bfd3-8f3b77e847d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.54
+ 100.64.41.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697097448
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fcf23030-68d4-11ee-bfd3-8f3b77e847d5
+
+
+
diff --git a/graph/incidents_graphml/f/fcf303d0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/fcf303d0-27a0-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..316e11e1d2b87d71cad0208785f3060840fe849d
--- /dev/null
+++ b/graph/incidents_graphml/f/fcf303d0-27a0-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718075786
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fcf303d0-27a0-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/f/fcfa7940-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fcfa7940-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4de10fee743385f5e67800a03d873e261a702afb
--- /dev/null
+++ b/graph/incidents_graphml/f/fcfa7940-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.248
+ 100.64.33.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488193
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fcfa7940-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fcfbcef0-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/f/fcfbcef0-10b5-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6ee16ccc126bc9881047e3fe14419529c90c876
--- /dev/null
+++ b/graph/incidents_graphml/f/fcfbcef0-10b5-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.62
+ 100.64.68.62
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1687408431
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fcfbcef0-10b5-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/f/fcfdf230-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fcfdf230-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2bba9ae499ebdfc2596fa4616297fd6612863d5a
--- /dev/null
+++ b/graph/incidents_graphml/f/fcfdf230-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.182
+ 100.64.16.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcfdf230-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..74ce38283617bf5df18fca909a942b50d2763b99
--- /dev/null
+++ b/graph/incidents_graphml/f/fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+ INCIDENT_LINK
+ 1708801663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fd065640-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/f/fd065640-10b5-11ee-aed8-b565505929b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49e056b085057bf7b9d7547765e40bab9f122003
--- /dev/null
+++ b/graph/incidents_graphml/f/fd065640-10b5-11ee-aed8-b565505929b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.62
+ 100.64.68.62
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1687408431
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd065640-10b5-11ee-aed8-b565505929b5
+
+
+
diff --git a/graph/incidents_graphml/f/fd076b60-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd076b60-368b-11ee-b839-f5eaf8816d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..361ec974ff7572cb4bd2b48b5d0ef082f7bf51cc
--- /dev/null
+++ b/graph/incidents_graphml/f/fd076b60-368b-11ee-b839-f5eaf8816d24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.229
+ 100.64.28.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691568537
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd076b60-368b-11ee-b839-f5eaf8816d24
+
+
+
diff --git a/graph/incidents_graphml/f/fd0a30b0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fd0a30b0-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..236b689d683ed8927084322fa0364deebda20273
--- /dev/null
+++ b/graph/incidents_graphml/f/fd0a30b0-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.136
+ 100.64.49.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd0a30b0-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fd0c00f0-a826-11ee-a66a-73cdfe320442.graphml b/graph/incidents_graphml/f/fd0c00f0-a826-11ee-a66a-73cdfe320442.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cbb40e6ad828212a9c03d63ef3e9c00d5b33c39
--- /dev/null
+++ b/graph/incidents_graphml/f/fd0c00f0-a826-11ee-a66a-73cdfe320442.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.29
+ 100.64.38.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704059590
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd0c00f0-a826-11ee-a66a-73cdfe320442
+
+
+
diff --git a/graph/incidents_graphml/f/fd0ce650-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd0ce650-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cedeae15a62a32cc6443ada3f66f1f9126f3d13c
--- /dev/null
+++ b/graph/incidents_graphml/f/fd0ce650-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.182
+ 100.64.16.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd0ce650-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fd0d3080-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/fd0d3080-594c-11ed-aecd-b7c09b1a67fb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..096d397fca8baa5e44f1cdbc7562a94d4e152152
--- /dev/null
+++ b/graph/incidents_graphml/f/fd0d3080-594c-11ed-aecd-b7c09b1a67fb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.118
+ 100.64.71.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.119
+ 100.64.71.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667242271
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd0d3080-594c-11ed-aecd-b7c09b1a67fb
+
+
+ INCIDENT_LINK
+ 1667242271
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd0d3080-594c-11ed-aecd-b7c09b1a67fb
+
+
+
diff --git a/graph/incidents_graphml/f/fd0e3fb0-0eab-11ee-a4b1-aff62beab862.graphml b/graph/incidents_graphml/f/fd0e3fb0-0eab-11ee-a4b1-aff62beab862.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15e98ba011c30339baa3afe9ed3bb60e034fe147
--- /dev/null
+++ b/graph/incidents_graphml/f/fd0e3fb0-0eab-11ee-a4b1-aff62beab862.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.162
+ 100.64.46.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687184234
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd0e3fb0-0eab-11ee-a4b1-aff62beab862
+
+
+
diff --git a/graph/incidents_graphml/f/fd125d10-23a1-11ee-b3c4-1b81ee59f0d7.graphml b/graph/incidents_graphml/f/fd125d10-23a1-11ee-b3c4-1b81ee59f0d7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8fe285dffd676f85c0e537a8fe4d7f5b50dc2e2
--- /dev/null
+++ b/graph/incidents_graphml/f/fd125d10-23a1-11ee-b3c4-1b81ee59f0d7.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.83
+ 100.64.29.83
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1689488913
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd125d10-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+ INCIDENT_LINK
+ 1689488913
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd125d10-23a1-11ee-b3c4-1b81ee59f0d7
+
+
+
diff --git a/graph/incidents_graphml/f/fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68b5011b027276f348e538bceb22159cab7f233e
--- /dev/null
+++ b/graph/incidents_graphml/f/fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.242
+ 100.64.8.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708801663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8
+
+
+
diff --git a/graph/incidents_graphml/f/fd199a00-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fd199a00-90c3-11ee-80a7-fbabb114d7cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cb62cf098285bd9d4d1e0ba9af09fa2d77cc9af
--- /dev/null
+++ b/graph/incidents_graphml/f/fd199a00-90c3-11ee-80a7-fbabb114d7cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.136
+ 100.64.49.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701488193
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd199a00-90c3-11ee-80a7-fbabb114d7cd
+
+
+
diff --git a/graph/incidents_graphml/f/fd1c2090-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd1c2090-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6f29c41cd5ada622891bf3297c781971612e1d0e
--- /dev/null
+++ b/graph/incidents_graphml/f/fd1c2090-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.6
+ 100.64.23.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920461
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd1c2090-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fd1cc060-0570-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/f/fd1cc060-0570-11ee-bce7-dffdb32a6ba9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18fec8cfc566870e24a07a27cab94ebc467c447c
--- /dev/null
+++ b/graph/incidents_graphml/f/fd1cc060-0570-11ee-bce7-dffdb32a6ba9.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.56
+ 100.64.75.56
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.3
+ 100.64.72.3
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.215
+ 100.64.72.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1686169333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd1cc060-0570-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686169333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd1cc060-0570-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686169333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd1cc060-0570-11ee-bce7-dffdb32a6ba9
+
+
+ INCIDENT_LINK
+ 1686169333
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd1cc060-0570-11ee-bce7-dffdb32a6ba9
+
+
+
diff --git a/graph/incidents_graphml/f/fd286a80-66a7-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/f/fd286a80-66a7-11ee-8819-db4d49a98ea0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7b339fcc177fef7c3b4828ed10647d2d702b4c3
--- /dev/null
+++ b/graph/incidents_graphml/f/fd286a80-66a7-11ee-8819-db4d49a98ea0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.62.165
+ USER-0015-1449.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696858218
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd286a80-66a7-11ee-8819-db4d49a98ea0
+
+
+
diff --git a/graph/incidents_graphml/f/fd29e780-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd29e780-368b-11ee-b839-f5eaf8816d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44e790de309164dd7ebcf1f25501aaf7aa104dd9
--- /dev/null
+++ b/graph/incidents_graphml/f/fd29e780-368b-11ee-b839-f5eaf8816d24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.229
+ 100.64.28.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691568537
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd29e780-368b-11ee-b839-f5eaf8816d24
+
+
+
diff --git a/graph/incidents_graphml/f/fd2a0760-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fd2a0760-0b1a-11ef-9e64-a71223ce0876.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..625cdc93821f822c801a96a04d448843e0f57207
--- /dev/null
+++ b/graph/incidents_graphml/f/fd2a0760-0b1a-11ef-9e64-a71223ce0876.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.245.248
+ 172.22.245.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.194
+ 100.64.87.194
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714939601
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd2a0760-0b1a-11ef-9e64-a71223ce0876
+
+
+
diff --git a/graph/incidents_graphml/f/fd2dacc0-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd2dacc0-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93b83f0d90c6eed1c760df733a9224973e9ba248
--- /dev/null
+++ b/graph/incidents_graphml/f/fd2dacc0-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.6
+ 100.64.23.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920461
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd2dacc0-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fd2f2d30-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/fd2f2d30-2bf6-11ed-8886-957cd06d5e69.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ca298c4955da29968582a807ff1e2648f47568a
--- /dev/null
+++ b/graph/incidents_graphml/f/fd2f2d30-2bf6-11ed-8886-957cd06d5e69.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.245
+ 100.64.39.245
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1731.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1662257532
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd2f2d30-2bf6-11ed-8886-957cd06d5e69
+
+
+
diff --git a/graph/incidents_graphml/f/fd399800-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fd399800-1657-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c0d619179d8f8d7f29679b8a37ec5be92012d36
--- /dev/null
+++ b/graph/incidents_graphml/f/fd399800-1657-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688027766
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd399800-1657-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/f/fd3a7b10-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fd3a7b10-5510-11ee-acde-a35f456e55de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d70bae2dfbdecf952b7c5da3f2c6aad5645d2745
--- /dev/null
+++ b/graph/incidents_graphml/f/fd3a7b10-5510-11ee-acde-a35f456e55de.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.243
+ 100.64.13.243
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694924195
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd3a7b10-5510-11ee-acde-a35f456e55de
+
+
+
diff --git a/graph/incidents_graphml/f/fd3d6430-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd3d6430-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8bb77f645738b1f3a9621b7017b6551d78b38c6f
--- /dev/null
+++ b/graph/incidents_graphml/f/fd3d6430-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.217
+ 100.64.27.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920461
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd3d6430-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fd400b60-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fd400b60-908f-11ee-8556-17eb2ccba952.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad48b8ab830ee46e4203ff48fe1180e19d5bf2ee
--- /dev/null
+++ b/graph/incidents_graphml/f/fd400b60-908f-11ee-8556-17eb2ccba952.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.187
+ 100.64.7.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701465859
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd400b60-908f-11ee-8556-17eb2ccba952
+
+
+
diff --git a/graph/incidents_graphml/f/fd45d0a0-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd45d0a0-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..394728889eef847efc41fbbac6ac20dacb75ffb4
--- /dev/null
+++ b/graph/incidents_graphml/f/fd45d0a0-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.187
+ 100.64.16.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd45d0a0-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fd4ec950-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd4ec950-4bef-11ee-94e8-97f877b7b7a5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24f61bf9c079320d1ababc3f42e49de8c7e0fbc4
--- /dev/null
+++ b/graph/incidents_graphml/f/fd4ec950-4bef-11ee-94e8-97f877b7b7a5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.101
+ 100.64.39.101
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693920461
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd4ec950-4bef-11ee-94e8-97f877b7b7a5
+
+
+
diff --git a/graph/incidents_graphml/f/fd4f7c30-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/fd4f7c30-d360-11ee-82a4-572767498e98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c55b79abe743305d9cbecd25d5f31a19c45e1c1d
--- /dev/null
+++ b/graph/incidents_graphml/f/fd4f7c30-d360-11ee-82a4-572767498e98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.246
+ 100.64.8.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708812401
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd4f7c30-d360-11ee-82a4-572767498e98
+
+
+
diff --git a/graph/incidents_graphml/f/fd5476a0-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd5476a0-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..273e7c147cc0460cba2d0eadff751976510dc44f
--- /dev/null
+++ b/graph/incidents_graphml/f/fd5476a0-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.187
+ 100.64.16.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056681
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd5476a0-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fd54a320-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fd54a320-a2ca-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0ea58bea32cdc38fa8f3341daab791de32bca51
--- /dev/null
+++ b/graph/incidents_graphml/f/fd54a320-a2ca-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.172
+ 100.64.92.172
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703470321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd54a320-a2ca-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/f/fd598300-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd598300-368b-11ee-b839-f5eaf8816d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe52614ef0746228ee9a30552290521b82958967
--- /dev/null
+++ b/graph/incidents_graphml/f/fd598300-368b-11ee-b839-f5eaf8816d24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.62
+ 100.64.57.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691568537
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd598300-368b-11ee-b839-f5eaf8816d24
+
+
+
diff --git a/graph/incidents_graphml/f/fd5e10c0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd5e10c0-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9efa440cf1b56791a3a4c2cfc033890ecebc3fe7
--- /dev/null
+++ b/graph/incidents_graphml/f/fd5e10c0-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.109
+ USER-0015-1195.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355181
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd5e10c0-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/fd6032d0-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fd6032d0-1657-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d7e0849ba846acef12df711f4a8d89a8df04340
--- /dev/null
+++ b/graph/incidents_graphml/f/fd6032d0-1657-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688027766
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd6032d0-1657-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/f/fd60c570-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fd60c570-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3346346d576737515b86587dc3674123a2a12a77
--- /dev/null
+++ b/graph/incidents_graphml/f/fd60c570-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.44
+ 100.64.94.44
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1660457941
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd60c570-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fd656c00-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fd656c00-a2ca-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b0ba339903e3a3d7c6add9d0ea659bf1ae28f99
--- /dev/null
+++ b/graph/incidents_graphml/f/fd656c00-a2ca-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.61
+ 100.64.47.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703470321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd656c00-a2ca-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/f/fd669f10-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd669f10-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c44436e6b22a2217848bba3a1a56857bdb5e7056
--- /dev/null
+++ b/graph/incidents_graphml/f/fd669f10-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.189
+ 100.64.16.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd669f10-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fd69c620-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fd69c620-1b98-11ed-a54c-ef9c6482c8d3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d99f983690693ce8683a522e5a8b82ef04f17737
--- /dev/null
+++ b/graph/incidents_graphml/f/fd69c620-1b98-11ed-a54c-ef9c6482c8d3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.44
+ 100.64.94.44
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660457941
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd69c620-1b98-11ed-a54c-ef9c6482c8d3
+
+
+
diff --git a/graph/incidents_graphml/f/fd6c2c00-22d4-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/f/fd6c2c00-22d4-11ee-a717-3b672dfcef5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b10f063f23cb2fc900c2fc41895afaf87a33d0c
--- /dev/null
+++ b/graph/incidents_graphml/f/fd6c2c00-22d4-11ee-a717-3b672dfcef5e.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.100
+ 100.64.28.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.101
+ 100.64.28.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.43
+ 100.64.14.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.102
+ 100.64.28.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.103
+ 100.64.28.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.104
+ 100.64.28.104
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.105
+ 100.64.28.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.106
+ 100.64.28.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.107
+ 100.64.28.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd6c2c00-22d4-11ee-a717-3b672dfcef5e
+
+
+
diff --git a/graph/incidents_graphml/f/fd6d5300-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd6d5300-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..784b13612c0cc050305aa4d77e590179cb651ee9
--- /dev/null
+++ b/graph/incidents_graphml/f/fd6d5300-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.109
+ USER-0015-1195.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355181
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd6d5300-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/fd6e41a0-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fd6e41a0-15b5-11ef-8b2e-b54e20f7e466.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efd68be92d47070ae8b79a7e2135b6dda34bafc5
--- /dev/null
+++ b/graph/incidents_graphml/f/fd6e41a0-15b5-11ef-8b2e-b54e20f7e466.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.61.113
+ 172.25.61.113
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.95.106
+ 100.64.95.106
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1716105685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd6e41a0-15b5-11ef-8b2e-b54e20f7e466
+
+
+ INCIDENT_LINK
+ 1716105685
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd6e41a0-15b5-11ef-8b2e-b54e20f7e466
+
+
+
diff --git a/graph/incidents_graphml/f/fd767760-15fe-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/f/fd767760-15fe-11ee-b6c1-6f3fa2e3bf20.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e201b08fdb1f57ae8eb91fb7b3688e9984b88a7
--- /dev/null
+++ b/graph/incidents_graphml/f/fd767760-15fe-11ee-b6c1-6f3fa2e3bf20.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.101
+ USER-0015-1520.example.internal
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1687989541
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd767760-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+ INCIDENT_LINK
+ 1687989541
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd767760-15fe-11ee-b6c1-6f3fa2e3bf20
+
+
+
diff --git a/graph/incidents_graphml/f/fd7a9c40-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd7a9c40-83be-11ee-9aba-5d164a9ceb62.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35fcf28bafe309b1db1c0ac4cd8e0386c70a36d3
--- /dev/null
+++ b/graph/incidents_graphml/f/fd7a9c40-83be-11ee-9aba-5d164a9ceb62.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.189
+ 100.64.16.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700056681
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd7a9c40-83be-11ee-9aba-5d164a9ceb62
+
+
+
diff --git a/graph/incidents_graphml/f/fd7b35b0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd7b35b0-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..385cf5d7fa23d26813e636e7b93f5a6ed4f2a26e
--- /dev/null
+++ b/graph/incidents_graphml/f/fd7b35b0-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355181
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd7b35b0-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/fd7e34e0-2149-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/f/fd7e34e0-2149-11ee-ab17-9db2be59825a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8e3c0fe89c76c9e60c2d9d8a7fcb8b83f4f746d6
--- /dev/null
+++ b/graph/incidents_graphml/f/fd7e34e0-2149-11ee-ab17-9db2be59825a.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.221
+ 100.64.19.221
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.222
+ USER-0015-1219.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.223
+ 100.64.19.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.187
+ 100.64.15.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.224
+ 100.64.19.224
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.225
+ 100.64.19.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+ INCIDENT_LINK
+ 1689231216
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd7e34e0-2149-11ee-ab17-9db2be59825a
+
+
+
diff --git a/graph/incidents_graphml/f/fd81cda0-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fd81cda0-a2ca-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee44c70199731a226527b2ad3d63ebb64b47df65
--- /dev/null
+++ b/graph/incidents_graphml/f/fd81cda0-a2ca-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703470321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd81cda0-a2ca-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/f/fd837240-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fd837240-1657-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbd15a085b60af348444c7655cba9e7ebc5e25d0
--- /dev/null
+++ b/graph/incidents_graphml/f/fd837240-1657-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.237
+ 100.64.23.237
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688027766
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd837240-1657-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/f/fd853240-22d4-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/f/fd853240-22d4-11ee-a717-3b672dfcef5e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34a993a5d13826ddd8a027dcadbc29b7b5324c0f
--- /dev/null
+++ b/graph/incidents_graphml/f/fd853240-22d4-11ee-a717-3b672dfcef5e.graphml
@@ -0,0 +1,711 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.116
+ 100.64.28.116
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.117
+ 100.64.28.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.118
+ 100.64.28.118
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.119
+ 100.64.28.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.22
+ 100.64.28.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.199
+ USER-0015-1270.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.46
+ 100.64.28.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.120
+ 100.64.28.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.84
+ 100.64.16.84
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.121
+ 100.64.28.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.122
+ 100.64.28.122
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.123
+ 100.64.28.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.124
+ 100.64.28.124
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.125
+ 100.64.28.125
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.126
+ 100.64.28.126
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.127
+ USER-0015-1271.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+ INCIDENT_LINK
+ 1689400867
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fd853240-22d4-11ee-a717-3b672dfcef5e
+
+
+
diff --git a/graph/incidents_graphml/f/fd861140-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd861140-368b-11ee-b839-f5eaf8816d24.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffe9e24a0fdedbd3b11a23c9d4e5e5e798031f42
--- /dev/null
+++ b/graph/incidents_graphml/f/fd861140-368b-11ee-b839-f5eaf8816d24.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.62
+ 100.64.57.62
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691568537
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd861140-368b-11ee-b839-f5eaf8816d24
+
+
+
diff --git a/graph/incidents_graphml/f/fd89a990-742a-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/f/fd89a990-742a-11ee-8022-698b2c645bc2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21d3ef966bd87d783afcc49407eb21959f624e45
--- /dev/null
+++ b/graph/incidents_graphml/f/fd89a990-742a-11ee-8022-698b2c645bc2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.152.54
+ 172.21.152.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.89.202
+ 100.64.89.202
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698343848
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd89a990-742a-11ee-8022-698b2c645bc2
+
+
+ INCIDENT_LINK
+ 1698343848
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd89a990-742a-11ee-8022-698b2c645bc2
+
+
+
diff --git a/graph/incidents_graphml/f/fd8a50e0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd8a50e0-8675-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..376533d3d13e7dfbe1f0451926bb37fe909450fa
--- /dev/null
+++ b/graph/incidents_graphml/f/fd8a50e0-8675-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.113
+ 100.64.11.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700355181
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd8a50e0-8675-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/f/fd8dfb90-a8bd-11ee-be75-9d7de56126cf.graphml b/graph/incidents_graphml/f/fd8dfb90-a8bd-11ee-be75-9d7de56126cf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c655aafb96eb5d16a38398170ddd6c41a28aedc3
--- /dev/null
+++ b/graph/incidents_graphml/f/fd8dfb90-a8bd-11ee-be75-9d7de56126cf.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.195
+ 100.64.31.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.196
+ 100.64.31.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.51
+ 100.64.17.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.165
+ 100.64.23.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+ INCIDENT_LINK
+ 1704124445
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fd8dfb90-a8bd-11ee-be75-9d7de56126cf
+
+
+
diff --git a/graph/incidents_graphml/f/fd943540-9405-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/f/fd943540-9405-11ee-ae31-0b69a6db722c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a05214c443e98fdba3474d4f94cd79e54421fdf
--- /dev/null
+++ b/graph/incidents_graphml/f/fd943540-9405-11ee-ae31-0b69a6db722c.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.106
+ USER-0015-1230.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.107
+ 100.64.21.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.171
+ 100.64.19.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701846394
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd943540-9405-11ee-ae31-0b69a6db722c
+
+
+ INCIDENT_LINK
+ 1701846394
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd943540-9405-11ee-ae31-0b69a6db722c
+
+
+ INCIDENT_LINK
+ 1701846394
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd943540-9405-11ee-ae31-0b69a6db722c
+
+
+ INCIDENT_LINK
+ 1701846394
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd943540-9405-11ee-ae31-0b69a6db722c
+
+
+ INCIDENT_LINK
+ 1701846394
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd943540-9405-11ee-ae31-0b69a6db722c
+
+
+
diff --git a/graph/incidents_graphml/f/fd94dd90-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/fd94dd90-04ca-11ed-ab4e-45e26abbd382.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be54c01f4f48cdcd457de7a338837ab0cea2d2ff
--- /dev/null
+++ b/graph/incidents_graphml/f/fd94dd90-04ca-11ed-ab4e-45e26abbd382.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.59
+ 100.64.79.59
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.79.60
+ 100.64.79.60
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657950540
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd94dd90-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950540
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd94dd90-04ca-11ed-ab4e-45e26abbd382
+
+
+ INCIDENT_LINK
+ 1657950540
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ fd94dd90-04ca-11ed-ab4e-45e26abbd382
+
+
+
diff --git a/graph/incidents_graphml/f/fd9ba4f0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/fd9ba4f0-54af-11ee-b23a-419638593710.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58e3297ae39ea09f61bb814284997e9856879844
--- /dev/null
+++ b/graph/incidents_graphml/f/fd9ba4f0-54af-11ee-b23a-419638593710.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.186
+ 100.64.7.186
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.187
+ 100.64.7.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.188
+ 100.64.7.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.189
+ 100.64.7.189
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.190
+ 100.64.7.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.191
+ 100.64.7.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.192
+ 100.64.7.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.193
+ 100.64.7.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.194
+ 100.64.7.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.195
+ 100.64.7.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.196
+ 100.64.7.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.198
+ 100.64.7.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.199
+ 100.64.7.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.200
+ 100.64.7.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.201
+ 100.64.7.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.202
+ USER-0015-1186.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+ INCIDENT_LINK
+ 1694882534
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fd9ba4f0-54af-11ee-b23a-419638593710
+
+
+
diff --git a/graph/incidents_graphml/f/fda44f10-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fda44f10-446a-11ee-9b56-b315e86f4666.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df4e3542c1a429a3b93f4c30a9fcae234a075b22
--- /dev/null
+++ b/graph/incidents_graphml/f/fda44f10-446a-11ee-9b56-b315e86f4666.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.250
+ 100.64.25.250
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693093680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fda44f10-446a-11ee-9b56-b315e86f4666
+
+
+
diff --git a/graph/incidents_graphml/f/fda55220-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fda55220-1657-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ee6e720e1e4db66cdb8c03c5af097a0790bd991
--- /dev/null
+++ b/graph/incidents_graphml/f/fda55220-1657-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.237
+ 100.64.23.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688027766
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ fda55220-1657-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/f/fda72ff0-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fda72ff0-a2ca-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..418ae34195cfb81ef9cd954bc32d6b2ca46db960
--- /dev/null
+++ b/graph/incidents_graphml/f/fda72ff0-a2ca-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.179
+ 100.64.21.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703470321
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ fda72ff0-a2ca-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/f/fdae6d90-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/f/fdae6d90-a7f0-11ed-af31-070b715d9bbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..070640144e306056c7e2051207b437f1082e3a9d
--- /dev/null
+++ b/graph/incidents_graphml/f/fdae6d90-a7f0-11ed-af31-070b715d9bbb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.33.119
+ 172.20.33.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Windows Active Directory"]
+
+
+ HOST
+ 100.64.88.19
+ 100.64.88.19
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1675888900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fdae6d90-a7f0-11ed-af31-070b715d9bbb
+
+
+ INCIDENT_LINK
+ 1675888900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ fdae6d90-a7f0-11ed-af31-070b715d9bbb
+
+
+