diff --git a/graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88da57093cef1df7a49f6947eaa156687ec263b6 --- /dev/null +++ b/graph/incidents_graphml/f/f649e7f0-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.99 + 100.64.80.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1661949572 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f649e7f0-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ff8f1dbc017c9e99e8701d1aae203f76598405d --- /dev/null +++ b/graph/incidents_graphml/f/f6577500-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.42 + 100.64.64.42 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136784 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6577500-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43fbed7bb3b0e931d48ea6e1eb15b3d55b5b39bb --- /dev/null +++ b/graph/incidents_graphml/f/f65b8ba0-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.193 + 100.64.37.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718075775 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f65b8ba0-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml b/graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7e36398b21f4cc8ed58f13ca544d74db9cdc3cc2 --- /dev/null +++ b/graph/incidents_graphml/f/f66ee220-e69d-11ee-8f7e-8d09b3cead02.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.55 + 100.64.8.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.27 + 100.64.40.27 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710927661 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f66ee220-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927661 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f66ee220-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927661 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f66ee220-e69d-11ee-8f7e-8d09b3cead02 + + + INCIDENT_LINK + 1710927661 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f66ee220-e69d-11ee-8f7e-8d09b3cead02 + + + diff --git a/graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aebc4f00f03dfc2ff590e4790ccb209c7b4fec33 --- /dev/null +++ b/graph/incidents_graphml/f/f6750ce0-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.215 + 100.64.21.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435749 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6750ce0-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42467c6a5cc44a2439969a55066aa9a6848af099 --- /dev/null +++ b/graph/incidents_graphml/f/f67ef850-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1682629839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + f67ef850-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbb85bd8bac182ee7ba69adca93cf62969475a1a --- /dev/null +++ b/graph/incidents_graphml/f/f682c8e0-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.28.1 + 100.64.28.1 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1682629839 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + f682c8e0-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00f1b3d36b22ad8f9e7b46e22708060003d50019 --- /dev/null +++ b/graph/incidents_graphml/f/f682da10-9200-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701624332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f682da10-9200-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58d1bbe4bf85ab6740a6dd14f066804781205a35 --- /dev/null +++ b/graph/incidents_graphml/f/f685fcd0-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.77 + 100.64.41.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435749 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f685fcd0-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59a641c90445421e2459a5e3341bb9e712ecb755 --- /dev/null +++ b/graph/incidents_graphml/f/f68f2b60-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.16 + 100.64.30.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239303 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f68f2b60-6106-11ee-bc15-ebbbf2eb09b5 + + + INCIDENT_LINK + 1696239303 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f68f2b60-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4564e9fd6a4127bc32566ebba7fccc63d460ded2 --- /dev/null +++ b/graph/incidents_graphml/f/f6902fb0-176e-11ee-a7dc-57e99513cc0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1688147584 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6902fb0-176e-11ee-a7dc-57e99513cc0a + + + diff --git a/graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml b/graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9c43ac351649bc8e72cfcd5f3e249aa0e75f3f4 --- /dev/null +++ b/graph/incidents_graphml/f/f69131f0-9200-11ee-ac87-cff3005068fb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.72 + 100.64.15.72 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701624333 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f69131f0-9200-11ee-ac87-cff3005068fb + + + diff --git a/graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3580fea2c26d5aff53c9b954db5ffc10be83c771 --- /dev/null +++ b/graph/incidents_graphml/f/f6937ed0-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.184 + 100.64.15.184 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178148 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6937ed0-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bde0a878fbbdfc95593928f7e2d5886983d8f322 --- /dev/null +++ b/graph/incidents_graphml/f/f6956620-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.77 + 100.64.41.77 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435749 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6956620-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c749a002a0f67e87590e27850641d664dfa10b4 --- /dev/null +++ b/graph/incidents_graphml/f/f697a9c0-176e-11ee-a7dc-57e99513cc0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1688147584 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f697a9c0-176e-11ee-a7dc-57e99513cc0a + + + diff --git a/graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4561f9015e3b6c3ae7aa22566c6dfc61abccfe31 --- /dev/null +++ b/graph/incidents_graphml/f/f69bdf10-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.101 + 100.64.11.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355170 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f69bdf10-8675-11ee-823e-1956338371c0 + + + INCIDENT_LINK + 1700355170 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f69bdf10-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c274a7077351cb0ac99f6c7c0ad43ee46f4f0f0e --- /dev/null +++ b/graph/incidents_graphml/f/f69e4690-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.16 + 100.64.30.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239303 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f69e4690-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml b/graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9284e23ca2900cc7464d86155124bbd8ad1bd140 --- /dev/null +++ b/graph/incidents_graphml/f/f6a2fb10-e53f-11ed-b729-bb6ecc5516ca.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + HOST + 100.64.68.119 + 100.64.68.119 + ["Exploiting Host","Ransomware Target","Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1682629840 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Disrupted + f6a2fb10-e53f-11ed-b729-bb6ecc5516ca + + + diff --git a/graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e827dbe2c0130045b9ec862e40aaccba951e3e6b --- /dev/null +++ b/graph/incidents_graphml/f/f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.165 + 100.64.52.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6a68c80-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml b/graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dd223a1cc35ed8ea5f47ec1b50277fcc2a7490b --- /dev/null +++ b/graph/incidents_graphml/f/f6a87fc0-133f-11ef-90d6-79b9e3bf2217.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.151 + 100.64.29.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.17 + 100.64.44.17 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.221 + 100.64.56.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.56.222 + 100.64.56.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + INCIDENT_LINK + 1715835091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6a87fc0-133f-11ef-90d6-79b9e3bf2217 + + + diff --git a/graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24edae7c0eef9b4edeeaa89ecd7a15637ba5b8a7 --- /dev/null +++ b/graph/incidents_graphml/f/f6a98ca0-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.44 + 100.64.64.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6a98ca0-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..164ef44d44a0900110a7eacbdecd8f02b1c8d56c --- /dev/null +++ b/graph/incidents_graphml/f/f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153008 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6aa3cd0-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84a6ca9059203440642c0d0d2b767fb8e2f3b245 --- /dev/null +++ b/graph/incidents_graphml/f/f6ab6f70-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.101 + 100.64.11.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355170 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6ab6f70-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47bb79e6e044a464a671ae61a704ad10f0111742 --- /dev/null +++ b/graph/incidents_graphml/f/f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.17 + 100.64.24.17 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178148 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6abe8d0-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b76623c78b6d0505d14b31d6edf53b1a8ad2aac --- /dev/null +++ b/graph/incidents_graphml/f/f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.165 + 100.64.52.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6b7f1a0-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..335889c99300c9092860a4e1d2fb564039704104 --- /dev/null +++ b/graph/incidents_graphml/f/f6b81a90-ab74-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.226 + 100.64.92.226 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1676275436 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6b81a90-ab74-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e77a4cd3e34645c5dc97bdfabc618503f7bb04f2 --- /dev/null +++ b/graph/incidents_graphml/f/f6b880c0-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.44 + 100.64.64.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6b880c0-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ba388f8f4573930cad5e404e8c74692b936b996 --- /dev/null +++ b/graph/incidents_graphml/f/f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153009 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6b9cd30-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml new file mode 100644 index 0000000000000000000000000000000000000000..325ed59c523976decadfe6ca273025288cc18d66 --- /dev/null +++ b/graph/incidents_graphml/f/f6ba4bc0-a00c-11ee-a147-6d5e36330663.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.44 + 100.64.10.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.150 + 100.64.15.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.98 + 100.64.41.98 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.199 + 100.64.10.199 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.75 + 100.64.23.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168803 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6ba4bc0-a00c-11ee-a147-6d5e36330663 + + + diff --git a/graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml b/graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml new file mode 100644 index 0000000000000000000000000000000000000000..004bc426848ad096cb093fdb91308fc20745d0b8 --- /dev/null +++ b/graph/incidents_graphml/f/f6bcae70-ab74-11ed-b288-05f5e2790b36.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.226 + 100.64.92.226 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676275436 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6bcae70-ab74-11ed-b288-05f5e2790b36 + + + diff --git a/graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml b/graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69b9a53b05048348544c4628e3f05f499afd24a0 --- /dev/null +++ b/graph/incidents_graphml/f/f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.149 + USER-0015-1235.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687182935 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6bf97b0-0ea8-11ee-ac51-1fc12cdb93ff + + + diff --git a/graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..165ed21f98b7ccdb0de7cc2a69342236036ab2bb --- /dev/null +++ b/graph/incidents_graphml/f/f6c3e2e0-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.229 + USER-0015-1209.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375349 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6c3e2e0-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c711179881a1a2d2528de94ef43823f9424df56 --- /dev/null +++ b/graph/incidents_graphml/f/f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.167 + 100.64.52.167 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6c53810-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c87009397bee86409241b577f9d5dfbd5f65419f --- /dev/null +++ b/graph/incidents_graphml/f/f6c883c0-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.164 + 100.64.80.164 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.133 + 100.64.72.133 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6c883c0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6c883c0-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a90b4f121e726933801d2208e95ccc5e0065b0e8 --- /dev/null +++ b/graph/incidents_graphml/f/f6d220b0-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.92 + USER-0015-1614.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6d220b0-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f6d220b0-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb470f333c5ca6dc8cc63b49139caf2e7d1a6b54 --- /dev/null +++ b/graph/incidents_graphml/f/f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.167 + 100.64.52.167 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6d341d0-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml b/graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfec3664e28404729b83f922b411f055ed4c822d --- /dev/null +++ b/graph/incidents_graphml/f/f6d8e140-b4f1-11ed-9d28-d755eb33fc3e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.156 + 100.64.68.156 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1677318683 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6d8e140-b4f1-11ed-9d28-d755eb33fc3e + + + diff --git a/graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..559a4324387ada45ee5c79330ddb7485ffe49863 --- /dev/null +++ b/graph/incidents_graphml/f/f6d925a0-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.61 + 100.64.76.61 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645669 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6d925a0-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6764437e86bf26d036f488596b8f559265055a83 --- /dev/null +++ b/graph/incidents_graphml/f/f6e06b90-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.229 + USER-0015-1209.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6e06b90-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..128fb6aa4492a3d92e38361d92bf6d951e676d65 --- /dev/null +++ b/graph/incidents_graphml/f/f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.165 + 100.64.52.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6e2f940-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b4afbea5598df7c5d058543366d5b409d2db18b --- /dev/null +++ b/graph/incidents_graphml/f/f6f45830-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.104 + 100.64.14.104 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1675055236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6f45830-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc452e5ec2cc5435b1d167c039fb336c98cf53ac --- /dev/null +++ b/graph/incidents_graphml/f/f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.165 + 100.64.52.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6f4d390-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6761ae6cff9562c8c8ca831550117382df7a0e68 --- /dev/null +++ b/graph/incidents_graphml/f/f6f65a00-594c-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.113 + 100.64.71.113 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667242261 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6f65a00-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242261 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6f65a00-594c-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df82b27312726764b07e4ad415383ecdceffd818 --- /dev/null +++ b/graph/incidents_graphml/f/f6f8d200-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,819 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.163 + 100.64.22.163 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.240 + 100.64.8.240 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.164 + 100.64.22.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.165 + 100.64.22.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.166 + 100.64.22.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.167 + 100.64.22.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.168 + 100.64.22.168 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.152 + 100.64.10.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.224 + 100.64.17.224 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.179 + 100.64.12.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.170 + 100.64.22.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.171 + 100.64.22.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.172 + 100.64.22.172 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.173 + 100.64.22.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.174 + 100.64.22.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f6f8d200-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e4b0aaaad60ad67bfa3cd9e1a74fbefbf74b33e --- /dev/null +++ b/graph/incidents_graphml/f/f6fade70-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.61 + 100.64.76.61 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645669 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fade70-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml b/graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bdef03bc890bcfa0e68e3614be38b1247857c52 --- /dev/null +++ b/graph/incidents_graphml/f/f6fbdc50-f766-11ee-a32a-474576cc2660.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.171.187.67 + 10.171.187.67 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","PAN NGFW","Vulnerability Management"] + + + HOST + 100.64.70.124 + 100.64.70.124 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.125 + 100.64.70.125 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.126 + 100.64.70.126 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712773209 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fbdc50-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773209 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fbdc50-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773209 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fbdc50-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773209 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fbdc50-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773209 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fbdc50-f766-11ee-a32a-474576cc2660 + + + INCIDENT_LINK + 1712773209 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f6fbdc50-f766-11ee-a32a-474576cc2660 + + + diff --git a/graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml b/graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..493663773b9899862fdb970a3a98243450b021bb --- /dev/null +++ b/graph/incidents_graphml/f/f6fee010-2929-11ed-82c2-3385aead5ab0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.238 + 100.64.85.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661949573 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f6fee010-2929-11ed-82c2-3385aead5ab0 + + + diff --git a/graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..828cc604ef3043adc5d041733a2aa4f11df3a8e2 --- /dev/null +++ b/graph/incidents_graphml/f/f7003f10-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.14.104 + 100.64.14.104 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675055236 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7003f10-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb5357c3ab3e26f217802598632fac3c5b8e46d0 --- /dev/null +++ b/graph/incidents_graphml/f/f7024110-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7024110-5eac-11ee-b8f7-eb6c1fc8ba02 + + + INCIDENT_LINK + 1695980746 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7024110-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c17d440b818ac137bf91188b3283d1b1c4e2ed96 --- /dev/null +++ b/graph/incidents_graphml/f/f70bf670-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.129 + 100.64.52.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947620 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf670-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/f70bf7f0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f70bf7f0-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58ea3f6929fcd3b5ed47c200d4baec52630c9235 --- /dev/null +++ b/graph/incidents_graphml/f/f70bf7f0-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,367 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.215 + 100.64.54.215 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.46 + 100.64.64.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.138 + 100.64.21.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.63 + 100.64.38.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.47 + 100.64.64.47 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.48 + 100.64.64.48 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.99 + 100.64.29.99 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f70bf7f0-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f712e9b0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f712e9b0-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..561dfdc50bdcf5e3586964299c4c318eeb445230 --- /dev/null +++ b/graph/incidents_graphml/f/f712e9b0-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.187 + 100.64.22.187 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153009 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f712e9b0-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c18b447723d5ccd16138ed127038085677f0d755 --- /dev/null +++ b/graph/incidents_graphml/f/f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.63 + 100.64.27.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f717ebf0-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f71e6e80-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f71e6e80-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5a8c149d0141309f98916714879e2ae8ec13282 --- /dev/null +++ b/graph/incidents_graphml/f/f71e6e80-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136785 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f71e6e80-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f720cc60-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f720cc60-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ef191786701671d76b57b398b20aae34a0aaa7c --- /dev/null +++ b/graph/incidents_graphml/f/f720cc60-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.187 + 100.64.22.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153009 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f720cc60-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f720fd80-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f720fd80-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..088891424f0f3835548d6c50e235b75381d2258e --- /dev/null +++ b/graph/incidents_graphml/f/f720fd80-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f720fd80-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f7249240-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7249240-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b35aba921d93d21ef1f3a9038573de341d5c4c70 --- /dev/null +++ b/graph/incidents_graphml/f/f7249240-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.91 + 100.64.27.91 + ["Exploiting Host"] + 0.7525 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388831 + malicious + 0.7525 + 0.7525 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7249240-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f727d3a0-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f727d3a0-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8fd28a62e4a5ddaed2934f8edcd132f22f38395 --- /dev/null +++ b/graph/incidents_graphml/f/f727d3a0-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.63 + 100.64.17.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f727d3a0-06e3-11ef-a25f-979d2687f044 + + + INCIDENT_LINK + 1714476164 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f727d3a0-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9007d1357dc95848c201bda568a5fb202b3228e --- /dev/null +++ b/graph/incidents_graphml/f/f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.167 + 100.64.41.167 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980746 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f729ed50-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f72debc0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f72debc0-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35743a2a0d2dc7b0e14db48e9a8800d51ddb8d2a --- /dev/null +++ b/graph/incidents_graphml/f/f72debc0-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.189 + 100.64.22.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153009 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f72debc0-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f7384530-5eac-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/f/f7384530-5eac-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fff16cfd4ea0c3db5f65227ca34393645cbaf6a2 --- /dev/null +++ b/graph/incidents_graphml/f/f7384530-5eac-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.167 + 100.64.41.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695980747 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7384530-5eac-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/f/f73bb800-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f73bb800-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a9850f3c4d17a74b07df1690bdcc45a938551ed --- /dev/null +++ b/graph/incidents_graphml/f/f73bb800-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.64 + 100.64.76.64 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f73bb800-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f73dc890-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f73dc890-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df676fd63886d1155dbc76d77748069bb1a2ec4d --- /dev/null +++ b/graph/incidents_graphml/f/f73dc890-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178149 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f73dc890-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f7482ce0-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f7482ce0-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..544374120400fef7683a8083583ec6d447798377 --- /dev/null +++ b/graph/incidents_graphml/f/f7482ce0-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.65 + 100.64.17.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476164 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7482ce0-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/f74a90d0-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f74a90d0-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..012b85c6c360da7222caf5dba6f5bf2d6f9f2b2b --- /dev/null +++ b/graph/incidents_graphml/f/f74a90d0-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.63 + 100.64.5.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388831 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f74a90d0-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f74e1c40-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f74e1c40-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f84846209ecfc867562c5f239b0af916c958f9ec --- /dev/null +++ b/graph/incidents_graphml/f/f74e1c40-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.161 + 100.64.32.161 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178149 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f74e1c40-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f75150f0-66fb-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/f/f75150f0-66fb-11ee-869c-79758109a47c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad127311d49ce0fdeb37d6d2c58a60d079dfd344 --- /dev/null +++ b/graph/incidents_graphml/f/f75150f0-66fb-11ee-869c-79758109a47c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.25.7 + 100.64.25.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696894286 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f75150f0-66fb-11ee-869c-79758109a47c + + + diff --git a/graph/incidents_graphml/f/f752e2f0-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f752e2f0-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..232970964b8d9d3671e2126466a58277b33c09e1 --- /dev/null +++ b/graph/incidents_graphml/f/f752e2f0-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.185 + 100.64.12.185 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700085 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f752e2f0-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f7585980-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f7585980-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..195921429a6d1bd30fba7b1dab18006a7666880d --- /dev/null +++ b/graph/incidents_graphml/f/f7585980-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.65 + 100.64.17.65 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476164 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7585980-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/f75c10c0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f75c10c0-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76f21a15d46e133d5de94a8b8e0efe0608d671df --- /dev/null +++ b/graph/incidents_graphml/f/f75c10c0-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.123 + 100.64.7.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882524 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f75c10c0-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/f760cc30-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f760cc30-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cdad96349064142cbd48399adecf21d4aaddd61 --- /dev/null +++ b/graph/incidents_graphml/f/f760cc30-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.64 + 100.64.76.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689645670 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f760cc30-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f76387f0-0a0a-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/f76387f0-0a0a-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bafa417322f39c5ed3d92d4adc65c56430c22989 --- /dev/null +++ b/graph/incidents_graphml/f/f76387f0-0a0a-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.219 + 100.64.71.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.24.214 + HOST-2906 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675271 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f76387f0-0a0a-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675271 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f76387f0-0a0a-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/f/f766d870-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f766d870-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec3b656eb21e78430e9e6ef433730d87ccb426c1 --- /dev/null +++ b/graph/incidents_graphml/f/f766d870-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.67 + 100.64.17.67 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f766d870-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/f76a6290-2ea5-11ee-a61f-7552bb17f553.graphml b/graph/incidents_graphml/f/f76a6290-2ea5-11ee-a61f-7552bb17f553.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6463d0755ec038ebe716846270c76e638cf8bbee --- /dev/null +++ b/graph/incidents_graphml/f/f76a6290-2ea5-11ee-a61f-7552bb17f553.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.185 + 100.64.12.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690700085 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f76a6290-2ea5-11ee-a61f-7552bb17f553 + + + diff --git a/graph/incidents_graphml/f/f76c8b80-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f76c8b80-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..929932a030cfef2c941096d094812ed75d9f29f8 --- /dev/null +++ b/graph/incidents_graphml/f/f76c8b80-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.123 + 100.64.7.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882524 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f76c8b80-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/f76f56e0-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f76f56e0-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c697775cd932c5d916a19d6e328d2885ca64118 --- /dev/null +++ b/graph/incidents_graphml/f/f76f56e0-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.63 + 100.64.5.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388831 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f76f56e0-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f770ec40-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f770ec40-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f60da078ab8e3040d5369cfbdfd00dbf7acdd37 --- /dev/null +++ b/graph/incidents_graphml/f/f770ec40-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.171 + 100.64.30.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465850 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f770ec40-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/f774fcb0-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f774fcb0-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c8e9a8404735364747511f312163d92e6845469 --- /dev/null +++ b/graph/incidents_graphml/f/f774fcb0-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.127 + 100.64.50.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f774fcb0-7e40-11ee-a30b-3ba0d2ef4424 + + + INCIDENT_LINK + 1699452799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f774fcb0-7e40-11ee-a30b-3ba0d2ef4424 + + + INCIDENT_LINK + 1699452799 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f774fcb0-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f77506e0-7b86-11ee-bc5d-534fc2a19f5f.graphml b/graph/incidents_graphml/f/f77506e0-7b86-11ee-bc5d-534fc2a19f5f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce17f6a367c77027ca3cee6a0fee7ec4d870903b --- /dev/null +++ b/graph/incidents_graphml/f/f77506e0-7b86-11ee-bc5d-534fc2a19f5f.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.191 + 100.64.22.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699153010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f77506e0-7b86-11ee-bc5d-534fc2a19f5f + + + INCIDENT_LINK + 1699153010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f77506e0-7b86-11ee-bc5d-534fc2a19f5f + + + diff --git a/graph/incidents_graphml/f/f776c020-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f776c020-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ec891f11b19c32f705398d4dce0b68387a422dc --- /dev/null +++ b/graph/incidents_graphml/f/f776c020-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812391 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f776c020-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f7781d80-a00c-11ee-a147-6d5e36330663.graphml b/graph/incidents_graphml/f/f7781d80-a00c-11ee-a147-6d5e36330663.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b11de29eaabdacb80a6506cb0de5b402c4b0dec --- /dev/null +++ b/graph/incidents_graphml/f/f7781d80-a00c-11ee-a147-6d5e36330663.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.100 + 100.64.41.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.101 + 100.64.41.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.221 + 100.64.26.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.102 + 100.64.41.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.103 + 100.64.41.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.104 + 100.64.41.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + INCIDENT_LINK + 1703168804 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7781d80-a00c-11ee-a147-6d5e36330663 + + + diff --git a/graph/incidents_graphml/f/f77ae360-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f77ae360-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..235afef474927767729c221c2515f02226566ef4 --- /dev/null +++ b/graph/incidents_graphml/f/f77ae360-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,491 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.125 + 100.64.7.125 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.126 + 100.64.7.126 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.127 + 100.64.7.127 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.129 + 100.64.7.129 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.130 + 100.64.7.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.132 + 100.64.7.132 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.133 + 100.64.7.133 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.134 + 100.64.7.134 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882524 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f77ae360-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/f7813ff0-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f7813ff0-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6a15c877dfd5e7837a1e5f82eb14aa15eff2032 --- /dev/null +++ b/graph/incidents_graphml/f/f7813ff0-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.171 + 100.64.30.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465850 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7813ff0-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/f782ebf0-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f782ebf0-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4279eadbd75926002958740f84620641fb82078d --- /dev/null +++ b/graph/incidents_graphml/f/f782ebf0-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.69 + 100.64.17.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f782ebf0-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/f78417e0-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f78417e0-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..204a90cbe5b9df4446f0f3428ccebd6515fd6036 --- /dev/null +++ b/graph/incidents_graphml/f/f78417e0-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.127 + 100.64.50.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452799 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f78417e0-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f78abd50-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f78abd50-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c637adda5f548e14d7a93da5a0ea63e2954a728d --- /dev/null +++ b/graph/incidents_graphml/f/f78abd50-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812391 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f78abd50-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f78bfc80-ece0-11ee-ac0b-e5fde63aeb72.graphml b/graph/incidents_graphml/f/f78bfc80-ece0-11ee-ac0b-e5fde63aeb72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a291a243c0897f2e482c6e1390c08c48fdd2ad25 --- /dev/null +++ b/graph/incidents_graphml/f/f78bfc80-ece0-11ee-ac0b-e5fde63aeb72.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.177 + 100.64.26.177 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.36.138 + USER-0015-1510.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.215 + 100.64.68.215 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1711616146 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f78bfc80-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616146 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f78bfc80-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616146 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f78bfc80-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616146 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f78bfc80-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616146 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f78bfc80-ece0-11ee-ac0b-e5fde63aeb72 + + + INCIDENT_LINK + 1711616146 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f78bfc80-ece0-11ee-ac0b-e5fde63aeb72 + + + diff --git a/graph/incidents_graphml/f/f78f49a0-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f78f49a0-9b17-11ee-a7a5-af0e8425a262.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbd58e6564b65519a51c629eb0efdcc5d74e285b --- /dev/null +++ b/graph/incidents_graphml/f/f78f49a0-9b17-11ee-a7a5-af0e8425a262.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.145 + 100.64.31.145 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702623773 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f78f49a0-9b17-11ee-a7a5-af0e8425a262 + + + diff --git a/graph/incidents_graphml/f/f792f180-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/f792f180-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cd351f5e788143037db48bc3b320ce4ae3b1a685 --- /dev/null +++ b/graph/incidents_graphml/f/f792f180-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.69 + 100.64.17.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f792f180-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/f7970760-0bf4-11ee-9b02-ffb3de173f5d.graphml b/graph/incidents_graphml/f/f7970760-0bf4-11ee-9b02-ffb3de173f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2824589629f29a216450a33e0686424ed54b7d63 --- /dev/null +++ b/graph/incidents_graphml/f/f7970760-0bf4-11ee-9b02-ffb3de173f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.90 + 100.64.21.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.246 + 100.64.76.246 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686885724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7970760-0bf4-11ee-9b02-ffb3de173f5d + + + INCIDENT_LINK + 1686885724 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7970760-0bf4-11ee-9b02-ffb3de173f5d + + + diff --git a/graph/incidents_graphml/f/f79ae920-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/f79ae920-a79e-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8813a345221c113e3eb851a6251d599c5dd8c60d --- /dev/null +++ b/graph/incidents_graphml/f/f79ae920-a79e-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.68 + 100.64.8.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.144 + 100.64.10.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.145 + 100.64.10.145 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.146 + 100.64.10.146 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.147 + 100.64.10.147 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.149 + 100.64.8.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.148 + 100.64.10.148 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.149 + 100.64.10.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.150 + 100.64.10.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.151 + 100.64.10.151 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001169 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f79ae920-a79e-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/f/f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06d3d20f999944c9e2e5506c53ee5cff4f33d4cf --- /dev/null +++ b/graph/incidents_graphml/f/f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.199 + 100.64.10.199 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472992 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f79c61b0-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f79d7a70-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f79d7a70-9b17-11ee-a7a5-af0e8425a262.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbbf1a2218e97abb47856d48d7fd49b1fd0fa8d7 --- /dev/null +++ b/graph/incidents_graphml/f/f79d7a70-9b17-11ee-a7a5-af0e8425a262.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.145 + 100.64.31.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702623773 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f79d7a70-9b17-11ee-a7a5-af0e8425a262 + + + diff --git a/graph/incidents_graphml/f/f79e4a60-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f79e4a60-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..219dfe1996267dd056453c1a9c8372171d4e4fa3 --- /dev/null +++ b/graph/incidents_graphml/f/f79e4a60-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.68 + USER-0015-1732.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645671 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f79e4a60-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f7a5a920-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7a5a920-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d17a572122de35dfaa08d1caa440e10d3e7d4782 --- /dev/null +++ b/graph/incidents_graphml/f/f7a5a920-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388832 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7a5a920-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a.graphml b/graph/incidents_graphml/f/f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa523d96e854a61ae3b249c950b69187bad2214f --- /dev/null +++ b/graph/incidents_graphml/f/f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.199 + 100.64.10.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712472992 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7b010c0-f4ab-11ee-b9e4-ef5a54940d7a + + + diff --git a/graph/incidents_graphml/f/f7b25d30-3a24-11ef-898a-03f77eec545d.graphml b/graph/incidents_graphml/f/f7b25d30-3a24-11ef-898a-03f77eec545d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7b618ad9a8ace50077a2bdcfd29246b94cf36fc --- /dev/null +++ b/graph/incidents_graphml/f/f7b25d30-3a24-11ef-898a-03f77eec545d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.104 + 100.64.47.104 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720111592 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7b25d30-3a24-11ef-898a-03f77eec545d + + + diff --git a/graph/incidents_graphml/f/f7b8d230-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f7b8d230-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8251cbadeee9d25b0c4b7a1bd8fae888b28a7c0 --- /dev/null +++ b/graph/incidents_graphml/f/f7b8d230-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.244 + 100.64.8.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812392 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7b8d230-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f7c31c30-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7c31c30-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5110463c17c0671693a891365de6e03949b8771 --- /dev/null +++ b/graph/incidents_graphml/f/f7c31c30-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.93 + 100.64.27.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388832 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7c31c30-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f7c644c0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f7c644c0-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cc5b57cf05c71e5909ca000a944c800a15bb5ff --- /dev/null +++ b/graph/incidents_graphml/f/f7c644c0-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.68 + USER-0015-1732.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689645671 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7c644c0-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f7c72560-a8b3-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/f/f7c72560-a8b3-11ee-bb9e-f554981233b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5f9dc9d37cd9ec74776fcdb8e55bed097016ae9 --- /dev/null +++ b/graph/incidents_graphml/f/f7c72560-a8b3-11ee-bb9e-f554981233b0.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.61 + USER-0015-1505.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.42 + 100.64.68.42 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1704120140 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7c72560-a8b3-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120140 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7c72560-a8b3-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120140 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7c72560-a8b3-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120140 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f7c72560-a8b3-11ee-bb9e-f554981233b0 + + + diff --git a/graph/incidents_graphml/f/f7ce7d10-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/f7ce7d10-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a77f0d5b2a5335ae81abd92c6ac046e61b3aa2fd --- /dev/null +++ b/graph/incidents_graphml/f/f7ce7d10-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.244 + 100.64.8.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812392 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7ce7d10-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/f7d66bd0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f7d66bd0-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3c292667660faaac574084abe6109415fed71d4 --- /dev/null +++ b/graph/incidents_graphml/f/f7d66bd0-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.187 + 100.64.16.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718075777 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7d66bd0-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/f7e7d680-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f7e7d680-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d12e6686c867b94bd7c14c16c4bf76d3975889e --- /dev/null +++ b/graph/incidents_graphml/f/f7e7d680-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.71 + 100.64.17.71 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7e7d680-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f7eb3220-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f7eb3220-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7405e2c5a6df7fcb993419188c26add3b1149782 --- /dev/null +++ b/graph/incidents_graphml/f/f7eb3220-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.113 + 100.64.40.113 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f7eb3220-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f7f10a00-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f7f10a00-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a9a87838b603430c121e724094ab5855e570bc54 --- /dev/null +++ b/graph/incidents_graphml/f/f7f10a00-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.93 + 100.64.27.93 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388832 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f7f10a00-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f80095b0-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f80095b0-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82524abee14563f5d35d9ab644ffbdd6e5e3e234 --- /dev/null +++ b/graph/incidents_graphml/f/f80095b0-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.18 + 100.64.30.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239305 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f80095b0-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f8021580-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f8021580-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2682ffd65cceb02ff75741d29484db3f62315f10 --- /dev/null +++ b/graph/incidents_graphml/f/f8021580-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.113 + 100.64.40.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435751 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8021580-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f80221b0-2bbc-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/f/f80221b0-2bbc-11ef-b37a-07248b6407de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09948a9fa0e3037e9227ee9c77d06d2d0daa996d --- /dev/null +++ b/graph/incidents_graphml/f/f80221b0-2bbc-11ef-b37a-07248b6407de.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.41 + 100.64.19.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718527608 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f80221b0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527608 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f80221b0-2bbc-11ef-b37a-07248b6407de + + + diff --git a/graph/incidents_graphml/f/f805e5d0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f805e5d0-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48a3acb1f620561a53abcd9232bb127127bb1098 --- /dev/null +++ b/graph/incidents_graphml/f/f805e5d0-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.17.71 + 100.64.17.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645671 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f805e5d0-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f809b050-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f809b050-176e-11ee-a7dc-57e99513cc0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1f543eea4db0691e28be1e7d2c823a2ab707f96 --- /dev/null +++ b/graph/incidents_graphml/f/f809b050-176e-11ee-a7dc-57e99513cc0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1688147587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f809b050-176e-11ee-a7dc-57e99513cc0a + + + diff --git a/graph/incidents_graphml/f/f8101f40-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f8101f40-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..477c5091d187ce86d3a5c0499e07b5d5525e50da --- /dev/null +++ b/graph/incidents_graphml/f/f8101f40-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.163 + 100.64.53.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8101f40-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f811c6a0-176e-11ee-a7dc-57e99513cc0a.graphml b/graph/incidents_graphml/f/f811c6a0-176e-11ee-a7dc-57e99513cc0a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5975a1064fe96080ea4229c6037153c2b775405f --- /dev/null +++ b/graph/incidents_graphml/f/f811c6a0-176e-11ee-a7dc-57e99513cc0a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1688147587 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f811c6a0-176e-11ee-a7dc-57e99513cc0a + + + diff --git a/graph/incidents_graphml/f/f815a450-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f815a450-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de1f8ebf4e896f2bd608590afb9432fb3c2234cf --- /dev/null +++ b/graph/incidents_graphml/f/f815a450-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.18 + 100.64.30.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239305 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f815a450-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f81f3a70-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/f81f3a70-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a46ca0c648ae08c5698608c5869acaed9c4e6352 --- /dev/null +++ b/graph/incidents_graphml/f/f81f3a70-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.163 + 100.64.53.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435751 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f81f3a70-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/f8222060-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f8222060-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcbe74c280ac90cab6fee0bbb4b98358d2043f64 --- /dev/null +++ b/graph/incidents_graphml/f/f8222060-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.71 + 100.64.76.71 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689645671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8222060-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f8250da0-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f8250da0-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a6c0b148cb0f4ae3f988a10bb3b498e26846f80 --- /dev/null +++ b/graph/incidents_graphml/f/f8250da0-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.20 + 100.64.30.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239305 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8250da0-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f8280440-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f8280440-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4122ecf3b98742684278861e012dd8bcc4da171d --- /dev/null +++ b/graph/incidents_graphml/f/f8280440-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.148 + 100.64.83.148 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1718928329 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8280440-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/f/f837ab40-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f837ab40-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52dd47cddaebb4855ab83fb54d282ddcbb534feb --- /dev/null +++ b/graph/incidents_graphml/f/f837ab40-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.20 + 100.64.30.20 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239305 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f837ab40-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f83f9360-efc3-11ec-9799-0176ac54cf1b.graphml b/graph/incidents_graphml/f/f83f9360-efc3-11ec-9799-0176ac54cf1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b263567b8be2c10ad50091f65ace9584297805f6 --- /dev/null +++ b/graph/incidents_graphml/f/f83f9360-efc3-11ec-9799-0176ac54cf1b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.37 + USER-0015-1666.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655638550 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f83f9360-efc3-11ec-9799-0176ac54cf1b + + + INCIDENT_LINK + 1655638550 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f83f9360-efc3-11ec-9799-0176ac54cf1b + + + diff --git a/graph/incidents_graphml/f/f84233a0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f84233a0-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce7db8e43b28c14518aadb877590c9e356467753 --- /dev/null +++ b/graph/incidents_graphml/f/f84233a0-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.139 + 100.64.83.139 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f84233a0-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f8482710-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f8482710-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..992b45a7cd8538bf187a1fe437b6520d11d0cd00 --- /dev/null +++ b/graph/incidents_graphml/f/f8482710-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.139 + 100.64.83.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8482710-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f84b5b60-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f84b5b60-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8015a602ab7e30b3343f6703cd265542c3994cf6 --- /dev/null +++ b/graph/incidents_graphml/f/f84b5b60-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.140 + 100.64.83.140 + ["Exploiting Target"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f84b5b60-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f8532390-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f8532390-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33d7f4234863cd24703e67c6fab8024854091114 --- /dev/null +++ b/graph/incidents_graphml/f/f8532390-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.141 + 100.64.83.141 + ["Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8532390-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f853b700-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/f853b700-01e1-11ef-a2c7-1dd1210cf0bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a3917d32616ce0942b30ea8c0a79e824119026e --- /dev/null +++ b/graph/incidents_graphml/f/f853b700-01e1-11ef-a2c7-1dd1210cf0bf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.55 + 100.64.28.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713925551 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f853b700-01e1-11ef-a2c7-1dd1210cf0bf + + + diff --git a/graph/incidents_graphml/f/f8577000-ec76-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/f/f8577000-ec76-11ee-a77b-a53bbd4435f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df90652886b115bd902417329756a6e287a69370 --- /dev/null +++ b/graph/incidents_graphml/f/f8577000-ec76-11ee-a77b-a53bbd4435f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.237 + 100.64.53.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711570621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8577000-ec76-11ee-a77b-a53bbd4435f6 + + + diff --git a/graph/incidents_graphml/f/f859da50-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f859da50-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4288a796c7b2db0b945117092daea9e3aecc57a4 --- /dev/null +++ b/graph/incidents_graphml/f/f859da50-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.141 + 100.64.83.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f859da50-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f85a0050-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f85a0050-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f490523ef3aea8f8815d9d5c84e338aee9a8f9f --- /dev/null +++ b/graph/incidents_graphml/f/f85a0050-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.73 + 100.64.47.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f85a0050-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/f/f85f7260-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/f/f85f7260-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0a27ea2e7e0eea234025f2d5ec6053088377727 --- /dev/null +++ b/graph/incidents_graphml/f/f85f7260-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.178 + 100.64.49.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.179 + 100.64.49.179 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.180 + 100.64.49.180 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.181 + USER-0015-1383.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f85f7260-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/f/f85fa6b0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f85fa6b0-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90502ecf040d980c72ad3c6fd1ada4dd29e313ad --- /dev/null +++ b/graph/incidents_graphml/f/f85fa6b0-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.142 + 100.64.83.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f85fa6b0-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f86100a0-56ff-11ee-82f3-cfca3c4a6159.graphml b/graph/incidents_graphml/f/f86100a0-56ff-11ee-82f3-cfca3c4a6159.graphml new file mode 100644 index 0000000000000000000000000000000000000000..635e66d8f149fb528fd1ec210e58626f86ea794b --- /dev/null +++ b/graph/incidents_graphml/f/f86100a0-56ff-11ee-82f3-cfca3c4a6159.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.29 + 100.64.15.29 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695136787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f86100a0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f86100a0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f86100a0-56ff-11ee-82f3-cfca3c4a6159 + + + INCIDENT_LINK + 1695136787 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f86100a0-56ff-11ee-82f3-cfca3c4a6159 + + + diff --git a/graph/incidents_graphml/f/f86458d0-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/f86458d0-01e1-11ef-a2c7-1dd1210cf0bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e17254f4fd4b45b25ddc77a48ec6199846a172d --- /dev/null +++ b/graph/incidents_graphml/f/f86458d0-01e1-11ef-a2c7-1dd1210cf0bf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.55 + 100.64.28.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713925551 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f86458d0-01e1-11ef-a2c7-1dd1210cf0bf + + + diff --git a/graph/incidents_graphml/f/f865e840-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f865e840-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c38c4f491832edbb6010b9c3d665707c9cd0ae2a --- /dev/null +++ b/graph/incidents_graphml/f/f865e840-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.83.142 + 100.64.83.142 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f865e840-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f86a06f0-624f-11ed-93f8-4552f33ca5e0.graphml b/graph/incidents_graphml/f/f86a06f0-624f-11ed-93f8-4552f33ca5e0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3aaf69f34a6b12f596fc9e2290a67160bc488597 --- /dev/null +++ b/graph/incidents_graphml/f/f86a06f0-624f-11ed-93f8-4552f33ca5e0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.146.99.50 + 10.146.99.50 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","AWS VPC Security"] + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Target"] + 0.578125 + ["Precinct","AWS VPC Security"] + + + INCIDENT_LINK + 1668233112 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f86a06f0-624f-11ed-93f8-4552f33ca5e0 + + + diff --git a/graph/incidents_graphml/f/f86c5790-ec76-11ee-a77b-a53bbd4435f6.graphml b/graph/incidents_graphml/f/f86c5790-ec76-11ee-a77b-a53bbd4435f6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77049331730eef35dbcbd65e2b29501f463c68cc --- /dev/null +++ b/graph/incidents_graphml/f/f86c5790-ec76-11ee-a77b-a53bbd4435f6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.237 + 100.64.53.237 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711570621 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f86c5790-ec76-11ee-a77b-a53bbd4435f6 + + + diff --git a/graph/incidents_graphml/f/f8714cb0-26cd-11ee-863d-83828757c718.graphml b/graph/incidents_graphml/f/f8714cb0-26cd-11ee-863d-83828757c718.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bd90abee126b728e577448deaf95d6587a97f3e --- /dev/null +++ b/graph/incidents_graphml/f/f8714cb0-26cd-11ee-863d-83828757c718.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.186 + 100.64.49.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.187 + 100.64.49.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.188 + USER-0015-1384.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8714cb0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8714cb0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8714cb0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8714cb0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8714cb0-26cd-11ee-863d-83828757c718 + + + INCIDENT_LINK + 1689837657 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8714cb0-26cd-11ee-863d-83828757c718 + + + diff --git a/graph/incidents_graphml/f/f872a950-156c-11ef-aecb-e5bec61c0532.graphml b/graph/incidents_graphml/f/f872a950-156c-11ef-aecb-e5bec61c0532.graphml new file mode 100644 index 0000000000000000000000000000000000000000..debf692ca61e0a4809f6dc77dff1ca7e4b5a4e7c --- /dev/null +++ b/graph/incidents_graphml/f/f872a950-156c-11ef-aecb-e5bec61c0532.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.238 + 100.64.29.238 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716074324 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f872a950-156c-11ef-aecb-e5bec61c0532 + + + diff --git a/graph/incidents_graphml/f/f8777810-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f8777810-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..863c0971e7e580b92905e7084fb7039036419087 --- /dev/null +++ b/graph/incidents_graphml/f/f8777810-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,93 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.95 + 100.64.27.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8777810-22b8-11ee-8861-516dde03d998 + + + INCIDENT_LINK + 1689388833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8777810-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f244a9372a3cd7da023b1000710d76d1712777d0 --- /dev/null +++ b/graph/incidents_graphml/f/f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.41 + 100.64.50.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713925552 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f87a2ac0-01e1-11ef-a2c7-1dd1210cf0bf + + + diff --git a/graph/incidents_graphml/f/f88045f0-250e-11ee-8dd6-41dd8139c6e5.graphml b/graph/incidents_graphml/f/f88045f0-250e-11ee-8dd6-41dd8139c6e5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d2575a46aefe5e5a232271daa3d2116e27879f9 --- /dev/null +++ b/graph/incidents_graphml/f/f88045f0-250e-11ee-8dd6-41dd8139c6e5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.72 + 100.64.76.72 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1689645672 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f88045f0-250e-11ee-8dd6-41dd8139c6e5 + + + diff --git a/graph/incidents_graphml/f/f893ce80-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f893ce80-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..380bb9fcbd012bfe31df9bb81a4df0a7a0fecf24 --- /dev/null +++ b/graph/incidents_graphml/f/f893ce80-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.101 + 100.64.74.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 192.168.199.244 + 192.168.199.244 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.102 + 100.64.74.102 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688351169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f893ce80-1948-11ee-8b71-f9525f65ac72 + + + INCIDENT_LINK + 1688351169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f893ce80-1948-11ee-8b71-f9525f65ac72 + + + INCIDENT_LINK + 1688351169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f893ce80-1948-11ee-8b71-f9525f65ac72 + + + INCIDENT_LINK + 1688351169 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f893ce80-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/f89427d0-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f89427d0-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3ddf3949866e0f6d3cabc017d801e9b055288fd --- /dev/null +++ b/graph/incidents_graphml/f/f89427d0-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388833 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f89427d0-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f8959ad0-a061-11ee-9181-41cbe26a7b16.graphml b/graph/incidents_graphml/f/f8959ad0-a061-11ee-9181-41cbe26a7b16.graphml new file mode 100644 index 0000000000000000000000000000000000000000..931edb4886eb24cd4485c6c87f855cc14295cc4a --- /dev/null +++ b/graph/incidents_graphml/f/f8959ad0-a061-11ee-9181-41cbe26a7b16.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703205313 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8959ad0-a061-11ee-9181-41cbe26a7b16 + + + INCIDENT_LINK + 1703205313 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8959ad0-a061-11ee-9181-41cbe26a7b16 + + + diff --git a/graph/incidents_graphml/f/f896cba0-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f896cba0-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecc5c96596f6c0b242972af8d5ac87ec0c9c2591 --- /dev/null +++ b/graph/incidents_graphml/f/f896cba0-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.26 + 100.64.7.26 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718928330 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f896cba0-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/f/f8a04b30-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/f8a04b30-a79e-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c03eb0d9159762f64e025b890f06c6fd505661f7 --- /dev/null +++ b/graph/incidents_graphml/f/f8a04b30-a79e-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.163 + 100.64.10.163 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.164 + 100.64.10.164 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.166 + 100.64.10.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.167 + 100.64.10.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.168 + 100.64.10.168 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.169 + 100.64.10.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.170 + 100.64.10.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.84 + 100.64.8.84 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.171 + 100.64.10.171 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.172 + 100.64.10.172 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.173 + 100.64.10.173 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.174 + 100.64.10.174 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001171 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8a04b30-a79e-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/f/f8a74c30-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f8a74c30-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bae672f2f879deaf3c5f802682fd8714d72ab5b --- /dev/null +++ b/graph/incidents_graphml/f/f8a74c30-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.16.63 + 100.64.16.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685598095 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8a74c30-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/f8aa30f0-086f-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/f/f8aa30f0-086f-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec8d0bc5a8ca1bf0fe42b2e3079fe344581abe13 --- /dev/null +++ b/graph/incidents_graphml/f/f8aa30f0-086f-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.173 + 100.64.58.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.153 + 100.64.25.153 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.70 + 100.64.6.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.174 + 100.64.58.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.175 + 100.64.58.175 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.176 + 100.64.58.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.229 + 100.64.5.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.199 + 100.64.54.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.177 + 100.64.58.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + INCIDENT_LINK + 1714646247 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8aa30f0-086f-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/f/f8b67e40-8981-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/f/f8b67e40-8981-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12783983bc323dd70f5bc1e4f3e12e7ce38835d8 --- /dev/null +++ b/graph/incidents_graphml/f/f8b67e40-8981-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.157 + 100.64.9.157 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.2 + 100.64.31.2 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.189 + 100.64.23.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.37 + 100.64.30.37 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.83 + 100.64.33.83 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.84 + 100.64.33.84 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.16 + 100.64.27.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.85 + 100.64.33.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.86 + 100.64.33.86 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.87 + 100.64.33.87 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.47 + 100.64.33.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.88 + 100.64.33.88 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.89 + 100.64.33.89 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.90 + 100.64.33.90 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.91 + 100.64.33.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Azure Security"] + + + HOST + 100.64.33.92 + 100.64.33.92 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.93 + 100.64.33.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.94 + USER-0015-1298.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.156 + 100.64.8.156 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.95 + 100.64.33.95 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b67e40-8981-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/f/f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a124526e6f0b2b37350eaf169c977369b96cef0 --- /dev/null +++ b/graph/incidents_graphml/f/f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.184 + 100.64.24.184 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084916 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8b9a9c0-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/f8ba2970-1c98-11ed-af5f-bdf516dc7507.graphml b/graph/incidents_graphml/f/f8ba2970-1c98-11ed-af5f-bdf516dc7507.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81d945a815366331353e0b6f0a466b9d8e1f04c4 --- /dev/null +++ b/graph/incidents_graphml/f/f8ba2970-1c98-11ed-af5f-bdf516dc7507.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.84.128 + 100.64.84.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660567885 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8ba2970-1c98-11ed-af5f-bdf516dc7507 + + + diff --git a/graph/incidents_graphml/f/f8bc4940-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f8bc4940-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c67a16b4e7b7200c738c73103c3c5b7d2eb19aad --- /dev/null +++ b/graph/incidents_graphml/f/f8bc4940-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.101 + 100.64.10.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8bc4940-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f8c341e0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/f8c341e0-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..842fae80d5596a96c12fa2d6f6a6f60d8815ae3b --- /dev/null +++ b/graph/incidents_graphml/f/f8c341e0-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.145 + 100.64.7.145 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.146 + 100.64.7.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.147 + 100.64.7.147 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.148 + 100.64.7.148 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.149 + 100.64.7.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.150 + 100.64.7.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.151 + 100.64.7.151 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.152 + 100.64.7.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.153 + 100.64.7.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.154 + 100.64.7.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.156 + 100.64.7.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.10 + 100.64.6.10 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.157 + 100.64.7.157 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.158 + 100.64.7.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.159 + 100.64.7.159 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.161 + 100.64.7.161 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.162 + 100.64.7.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.163 + 100.64.7.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882526 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c341e0-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/f8c98170-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/f/f8c98170-3026-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57f2b89068ad63652ca53d0f857f4c3883e221ae --- /dev/null +++ b/graph/incidents_graphml/f/f8c98170-3026-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690865443 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c98170-3026-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865443 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8c98170-3026-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/f/f8d170e0-21fe-11ef-a065-0d11f2930c39.graphml b/graph/incidents_graphml/f/f8d170e0-21fe-11ef-a065-0d11f2930c39.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df99add10250253e90a65681ad47fd37b5fa6f54 --- /dev/null +++ b/graph/incidents_graphml/f/f8d170e0-21fe-11ef-a065-0d11f2930c39.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.159 + 100.64.32.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717456445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8d170e0-21fe-11ef-a065-0d11f2930c39 + + + diff --git a/graph/incidents_graphml/f/f8d6f270-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f8d6f270-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c69e35528726b91a93dde10814056fae1c387cd1 --- /dev/null +++ b/graph/incidents_graphml/f/f8d6f270-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.156 + 100.64.19.156 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8d6f270-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/f8d995c0-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f8d995c0-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0965e23356409471f0c2ef5c43d9a24d3d1750cd --- /dev/null +++ b/graph/incidents_graphml/f/f8d995c0-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.131 + 100.64.50.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8d995c0-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fb414566562f3cdc04fc29e8a556ecc9667aa28 --- /dev/null +++ b/graph/incidents_graphml/f/f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.184 + 100.64.24.184 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084916 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8d9dbf0-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/f8dc73b0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f8dc73b0-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72b411d3837267682ee600a399fa2a983ce50471 --- /dev/null +++ b/graph/incidents_graphml/f/f8dc73b0-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.53 + 100.64.17.53 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.249 + 100.64.18.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8dc73b0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8dc73b0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8dc73b0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8dc73b0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8dc73b0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f8dc73b0-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f8e04750-6106-11ee-bc15-ebbbf2eb09b5.graphml b/graph/incidents_graphml/f/f8e04750-6106-11ee-bc15-ebbbf2eb09b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c8d3a9309cbc749fa661dc6cd822e5e7d9b84dc --- /dev/null +++ b/graph/incidents_graphml/f/f8e04750-6106-11ee-bc15-ebbbf2eb09b5.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.22 + 100.64.30.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696239306 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8e04750-6106-11ee-bc15-ebbbf2eb09b5 + + + INCIDENT_LINK + 1696239306 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8e04750-6106-11ee-bc15-ebbbf2eb09b5 + + + diff --git a/graph/incidents_graphml/f/f8e25a30-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/f8e25a30-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6345e192175c084590f5b611901078381482555 --- /dev/null +++ b/graph/incidents_graphml/f/f8e25a30-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.66 + 100.64.21.66 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093672 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8e25a30-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/f8e9b720-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f8e9b720-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c10250b40121f6c4f636a762584beae61979def0 --- /dev/null +++ b/graph/incidents_graphml/f/f8e9b720-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.225 + 100.64.34.225 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947623 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8e9b720-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/f8eca890-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f8eca890-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce7afd4b31ef4ad1f4db448c9f0a69d568f20718 --- /dev/null +++ b/graph/incidents_graphml/f/f8eca890-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.131 + 100.64.50.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452801 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f8eca890-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f8edd8d0-0a07-11ee-9f50-eb86987e1788.graphml b/graph/incidents_graphml/f/f8edd8d0-0a07-11ee-9f50-eb86987e1788.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fea5f7da026102eca1138f579f1be399f881182d --- /dev/null +++ b/graph/incidents_graphml/f/f8edd8d0-0a07-11ee-9f50-eb86987e1788.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.73 + 100.64.29.73 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.72 + 100.64.18.72 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686673985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8edd8d0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8edd8d0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8edd8d0-0a07-11ee-9f50-eb86987e1788 + + + INCIDENT_LINK + 1686673985 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8edd8d0-0a07-11ee-9f50-eb86987e1788 + + + diff --git a/graph/incidents_graphml/f/f8f10d70-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f8f10d70-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd2a0326c4e8f0bfe0a8af84010459a5cc6f43cb --- /dev/null +++ b/graph/incidents_graphml/f/f8f10d70-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.186 + 100.64.24.186 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084916 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8f10d70-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/f8f5de90-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/f8f5de90-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1dec630ef43e28a6a5b235fe34abe754ea5188c --- /dev/null +++ b/graph/incidents_graphml/f/f8f5de90-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.7 + 100.64.33.7 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465852 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f5de90-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/f8f757d0-8981-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/f/f8f757d0-8981-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ad30a87b2bd89744373c6aacce433fa0c4cfa15 --- /dev/null +++ b/graph/incidents_graphml/f/f8f757d0-8981-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,873 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.111 + 100.64.33.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.163 + 100.64.22.163 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.112 + 100.64.33.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.113 + 100.64.33.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.85 + 100.64.33.85 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.81 + 100.64.33.81 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.114 + 100.64.33.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.115 + 100.64.33.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.116 + 100.64.33.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.117 + 100.64.33.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.19 + 100.64.9.19 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.228 + 100.64.14.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.4 + 100.64.10.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.118 + 100.64.33.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.119 + 100.64.33.119 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f8f757d0-8981-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/f/f8fa1610-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f8fa1610-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63d41d4ecd7b6f4c6ee46be4de0e58cda89187b9 --- /dev/null +++ b/graph/incidents_graphml/f/f8fa1610-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.133 + 100.64.50.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452801 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f8fa1610-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f902ca40-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f902ca40-1bdf-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6025a51ba889081e017eaceb6d685e772320ca9 --- /dev/null +++ b/graph/incidents_graphml/f/f902ca40-1bdf-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.90.22 + 100.64.90.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660488428 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f902ca40-1bdf-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/f9040b00-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9040b00-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ae0bfa4eff3a5738ac88aca702ffb865c3e54f6 --- /dev/null +++ b/graph/incidents_graphml/f/f9040b00-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.203 + 100.64.34.203 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815823 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f9040b00-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..343fe57309a49bd936ca5d5caa9f56506d001386 --- /dev/null +++ b/graph/incidents_graphml/f/f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.117 + 100.64.40.117 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9059bb0-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f9095060-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f9095060-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31224d9c63a0697f6e85c590bf6b743bb98cd67d --- /dev/null +++ b/graph/incidents_graphml/f/f9095060-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.186 + 100.64.24.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084916 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9095060-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/f9095850-7e40-11ee-a30b-3ba0d2ef4424.graphml b/graph/incidents_graphml/f/f9095850-7e40-11ee-a30b-3ba0d2ef4424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7870e0e91bd06121eec8b4f5499975e3669ea798 --- /dev/null +++ b/graph/incidents_graphml/f/f9095850-7e40-11ee-a30b-3ba0d2ef4424.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.133 + 100.64.50.133 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699452801 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9095850-7e40-11ee-a30b-3ba0d2ef4424 + + + diff --git a/graph/incidents_graphml/f/f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..578ebd6b4bbad1658ba868df0a5721884559bab6 --- /dev/null +++ b/graph/incidents_graphml/f/f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.22 + 100.64.90.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660488428 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f90d2a80-1bdf-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/f90e7f70-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f90e7f70-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3bb7ea402c10c7e5bc15b9aa8677d051b35aa803 --- /dev/null +++ b/graph/incidents_graphml/f/f90e7f70-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.13 + 100.64.33.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f90e7f70-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f91f2140-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f91f2140-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2e9575d4d055ffbde6eb9dc75e1323f53572e8c --- /dev/null +++ b/graph/incidents_graphml/f/f91f2140-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.46 + 100.64.19.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274096 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f91f2140-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f9292940-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9292940-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0f8fc04b65d412fcb826d43148ab50c103013be7 --- /dev/null +++ b/graph/incidents_graphml/f/f9292940-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.176 + 100.64.46.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9292940-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f92a75c0-8981-11ee-94ad-436ebf198b76.graphml b/graph/incidents_graphml/f/f92a75c0-8981-11ee-94ad-436ebf198b76.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9668e63a55bb1855a06f3f3e9e264286424912f0 --- /dev/null +++ b/graph/incidents_graphml/f/f92a75c0-8981-11ee-94ad-436ebf198b76.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.131 + 100.64.33.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.132 + 100.64.33.132 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.111 + 100.64.30.111 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.178 + 100.64.11.178 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.134 + 100.64.33.134 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.135 + 100.64.33.135 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.136 + 100.64.33.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.159 + 100.64.14.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.137 + 100.64.33.137 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.233 + 100.64.10.233 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.49 + 100.64.22.49 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.138 + 100.64.33.138 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.139 + 100.64.33.139 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + INCIDENT_LINK + 1700690181 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f92a75c0-8981-11ee-94ad-436ebf198b76 + + + diff --git a/graph/incidents_graphml/f/f9307960-a8b3-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/f/f9307960-a8b3-11ee-bb9e-f554981233b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13806923d6f529bd76f4e0371e4365b5e225998b --- /dev/null +++ b/graph/incidents_graphml/f/f9307960-a8b3-11ee-bb9e-f554981233b0.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.151 + 100.64.68.151 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.37.112 + 100.64.37.112 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1704120142 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9307960-a8b3-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120142 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9307960-a8b3-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120142 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9307960-a8b3-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120142 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9307960-a8b3-11ee-bb9e-f554981233b0 + + + diff --git a/graph/incidents_graphml/f/f9326e00-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9326e00-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a66aad2f2a525e6be2102ec92fc1884f3608a8d --- /dev/null +++ b/graph/incidents_graphml/f/f9326e00-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.102 + 100.64.57.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815823 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9326e00-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f934a510-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f934a510-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb9967ef68563888c350d19c0986afea63855246 --- /dev/null +++ b/graph/incidents_graphml/f/f934a510-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.46 + 100.64.19.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f934a510-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c14527dd1e7de8b28eac80cadf1f61c502c6aeb9 --- /dev/null +++ b/graph/incidents_graphml/f/f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.176 + 100.64.46.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f938b9a0-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f93c2110-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f93c2110-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bb188cebd4e9d9f7d29dd9455ce1d29e061f606 --- /dev/null +++ b/graph/incidents_graphml/f/f93c2110-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.207 + USER-0015-1824.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93c2110-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f93fe870-6e78-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/f/f93fe870-6e78-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdf75451b72fa78741586d0d8a12868c0223b375 --- /dev/null +++ b/graph/incidents_graphml/f/f93fe870-6e78-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.158 + 100.64.15.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.4 + 100.64.10.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.159 + 100.64.15.159 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.160 + 100.64.15.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.161 + 100.64.15.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.162 + 100.64.15.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.163 + 100.64.15.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.164 + 100.64.15.164 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.165 + 100.64.15.165 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.166 + 100.64.15.166 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.118 + 100.64.12.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717635 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f93fe870-6e78-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/f/f94336e0-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f94336e0-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5497798a1c78c6156f4bc823a9a4e78dfb5b488 --- /dev/null +++ b/graph/incidents_graphml/f/f94336e0-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.102 + 100.64.57.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815823 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f94336e0-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f943f2e0-4401-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/f/f943f2e0-4401-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9bed6d2cb9d09c384fbbf647324222a4170159c --- /dev/null +++ b/graph/incidents_graphml/f/f943f2e0-4401-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.62.231 + 100.64.62.231 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.63 + 100.64.17.63 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.232 + 100.64.62.232 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.233 + 100.64.62.233 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.234 + 100.64.62.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048576 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f943f2e0-4401-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/f/f9446810-1c98-11ed-af5f-bdf516dc7507.graphml b/graph/incidents_graphml/f/f9446810-1c98-11ed-af5f-bdf516dc7507.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49c0482426fce2bd8fd164cd1e86336be4d7aa8a --- /dev/null +++ b/graph/incidents_graphml/f/f9446810-1c98-11ed-af5f-bdf516dc7507.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.133 + 100.64.84.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660567886 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9446810-1c98-11ed-af5f-bdf516dc7507 + + + diff --git a/graph/incidents_graphml/f/f945d4b0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f945d4b0-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2541d4b8751d3cbfea049f645099edaeb682c74 --- /dev/null +++ b/graph/incidents_graphml/f/f945d4b0-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.30 + 100.64.40.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855766 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f945d4b0-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f9460160-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f9460160-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d15981fcb877593f70c4711d854c8493f308a982 --- /dev/null +++ b/graph/incidents_graphml/f/f9460160-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.197 + 100.64.37.197 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718075780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9460160-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/f946a860-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f946a860-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e73d1e0a5036922dfc4b4921ddb2e57a099497c9 --- /dev/null +++ b/graph/incidents_graphml/f/f946a860-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.207 + USER-0015-1824.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f946a860-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f9488640-2f46-11ee-8421-f3eff1a35bff.graphml b/graph/incidents_graphml/f/f9488640-2f46-11ee-8421-f3eff1a35bff.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04cc8fb96e9ee7401d5c038dcf9f3a0f92ab3b35 --- /dev/null +++ b/graph/incidents_graphml/f/f9488640-2f46-11ee-8421-f3eff1a35bff.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.4.6 + 100.64.4.6 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690769237 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9488640-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769237 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9488640-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769237 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9488640-2f46-11ee-8421-f3eff1a35bff + + + INCIDENT_LINK + 1690769237 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9488640-2f46-11ee-8421-f3eff1a35bff + + + diff --git a/graph/incidents_graphml/f/f9495b70-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9495b70-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..723cf1730e4da011ba44e0846ba4959bcb2ac768 --- /dev/null +++ b/graph/incidents_graphml/f/f9495b70-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9495b70-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f94b1340-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f94b1340-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2cec17bcb4b00cf51644708d47cd521c24e2763 --- /dev/null +++ b/graph/incidents_graphml/f/f94b1340-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.191 + 100.64.39.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274096 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f94b1340-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f94bfb60-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/f94bfb60-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ce5f5ee6f346c4eefef90b2a83a809ca5504d52 --- /dev/null +++ b/graph/incidents_graphml/f/f94bfb60-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.254 + 100.64.14.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947624 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f94bfb60-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/f94d4ce0-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/f94d4ce0-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acc697713a00b6236eabca59bf0c3a5890960ceb --- /dev/null +++ b/graph/incidents_graphml/f/f94d4ce0-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.231 + HOST-3909 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375354 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f94d4ce0-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/f/f950f280-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f950f280-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81c15419ede9659a6a659c32819b25263a44040c --- /dev/null +++ b/graph/incidents_graphml/f/f950f280-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.103 + 100.64.57.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815823 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f950f280-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f952b650-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f952b650-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa97c7f6a35ce1901573d69eb8acec345cee2c8f --- /dev/null +++ b/graph/incidents_graphml/f/f952b650-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.208 + 100.64.79.208 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f952b650-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f95787f0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f95787f0-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ec1b413b01846982492cb35d35f34d28450a0b5 --- /dev/null +++ b/graph/incidents_graphml/f/f95787f0-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.30 + 100.64.40.30 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855767 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f95787f0-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f9591d00-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f9591d00-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5718abd5805b7a719772e87913af8473bc5176fe --- /dev/null +++ b/graph/incidents_graphml/f/f9591d00-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.193 + 100.64.39.193 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274096 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9591d00-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f95c5ea0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f95c5ea0-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5219d0cd2e15ebffc75ca3a2b6c64159bae6261 --- /dev/null +++ b/graph/incidents_graphml/f/f95c5ea0-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.103 + 100.64.11.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355174 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f95c5ea0-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/f95cef80-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f95cef80-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..508786200c4dec00d1f724996712be3869f049c0 --- /dev/null +++ b/graph/incidents_graphml/f/f95cef80-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.208 + 100.64.79.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f95cef80-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f95e7180-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/f95e7180-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06a301a8730f990fc5587681bcffc9d6abbe5a4a --- /dev/null +++ b/graph/incidents_graphml/f/f95e7180-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.73 + 100.64.13.73 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.248 + 100.64.70.248 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688351170 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f95e7180-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4391da0216f03d71c923d11012533f3b48c8cef6 --- /dev/null +++ b/graph/incidents_graphml/f/f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.103 + 100.64.57.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815823 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f95fbf90-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f9603620-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f9603620-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57f3acbcab1e2e675419ec980f8deed145760ff8 --- /dev/null +++ b/graph/incidents_graphml/f/f9603620-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.155 + USER-0015-2014.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1718928331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9603620-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/f/f965b8c0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f965b8c0-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94644153249d876d9bbfa5a539acd9c5916dc0f4 --- /dev/null +++ b/graph/incidents_graphml/f/f965b8c0-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.170 + 100.64.33.170 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855767 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f965b8c0-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f96792d0-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/f96792d0-a79e-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7168f9133d3c6fa6a9f220049310e9ac910a53c --- /dev/null +++ b/graph/incidents_graphml/f/f96792d0-a79e-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.187 + 100.64.10.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.188 + 100.64.10.188 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.189 + 100.64.10.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.190 + 100.64.10.190 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.191 + 100.64.10.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.192 + 100.64.10.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001172 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96792d0-a79e-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/f/f96970b0-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f96970b0-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ffaea61c96bc4e442b45baa7332d15c6b6a8035 --- /dev/null +++ b/graph/incidents_graphml/f/f96970b0-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.193 + 100.64.39.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274097 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96970b0-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f96bef00-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/f96bef00-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ee2ea28c47e6d798e85084f2580255b58bf91be --- /dev/null +++ b/graph/incidents_graphml/f/f96bef00-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.103 + 100.64.11.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355174 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96bef00-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/f96c58d0-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f96c58d0-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13cc4d98d3c0f84bbc85f50d7c870807131d6e4b --- /dev/null +++ b/graph/incidents_graphml/f/f96c58d0-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.209 + 100.64.79.209 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f96c58d0-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f970fc40-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f970fc40-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9346a31b122cc1a426a86afe744bd27f4e377194 --- /dev/null +++ b/graph/incidents_graphml/f/f970fc40-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178153 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f970fc40-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f9714bb0-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f9714bb0-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0f511382b245e2f65e792dccaf8c8a277d3167d --- /dev/null +++ b/graph/incidents_graphml/f/f9714bb0-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.217 + 100.64.73.217 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.151 + 100.64.77.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.180 + 100.64.71.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.69 + 100.64.73.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.77.152 + 100.64.77.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9714bb0-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/f/f9734790-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9734790-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..525bd2f7c385d047bbcbc3087a27119cd440502c --- /dev/null +++ b/graph/incidents_graphml/f/f9734790-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9734790-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f974ce20-11e8-11ed-97d5-3360f7274b74.graphml b/graph/incidents_graphml/f/f974ce20-11e8-11ed-97d5-3360f7274b74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3553d99c36713fbbda776b0a6b5c8e8a80fba58d --- /dev/null +++ b/graph/incidents_graphml/f/f974ce20-11e8-11ed-97d5-3360f7274b74.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.96 + 100.64.74.96 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.45 + USER-0015-1748.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.87 + 100.64.76.87 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659392783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f974ce20-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f974ce20-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f974ce20-11e8-11ed-97d5-3360f7274b74 + + + INCIDENT_LINK + 1659392783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f974ce20-11e8-11ed-97d5-3360f7274b74 + + + diff --git a/graph/incidents_graphml/f/f9750b60-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f9750b60-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b98ff719cab34ffa99a8f6c411885e3c49bec39 --- /dev/null +++ b/graph/incidents_graphml/f/f9750b60-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.210 + 100.64.79.210 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9750b60-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f9754920-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9754920-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09335bb96179eea55d671916b62b79bc6c1ba058 --- /dev/null +++ b/graph/incidents_graphml/f/f9754920-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.170 + 100.64.33.170 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855767 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9754920-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f97df750-2f61-11ef-b208-d10830cadc66.graphml b/graph/incidents_graphml/f/f97df750-2f61-11ef-b208-d10830cadc66.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f3fada3f486465f9f5a0cb2bc8321a34c3d183e --- /dev/null +++ b/graph/incidents_graphml/f/f97df750-2f61-11ef-b208-d10830cadc66.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.29.155 + USER-0015-2014.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718928331 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f97df750-2f61-11ef-b208-d10830cadc66 + + + diff --git a/graph/incidents_graphml/f/f97e5a30-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f97e5a30-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7d58b62800cf5d8f6b637638fa885763361ec10e --- /dev/null +++ b/graph/incidents_graphml/f/f97e5a30-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.210 + 100.64.79.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f97e5a30-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f981a980-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f981a980-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e6d04d20d2d31e6cc2d26e686f47b925ea80846 --- /dev/null +++ b/graph/incidents_graphml/f/f981a980-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.178 + 100.64.46.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f981a980-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f981c680-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f981c680-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6971cf6d2082582ca1e50e759e006f0a6016f9ab --- /dev/null +++ b/graph/incidents_graphml/f/f981c680-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.207 + 100.64.49.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f981c680-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f981d980-e2a2-11ee-8bca-5190faa7db82.graphml b/graph/incidents_graphml/f/f981d980-e2a2-11ee-8bca-5190faa7db82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b7d67d652f3e4c91bbf799e7c68685c7f3df07b --- /dev/null +++ b/graph/incidents_graphml/f/f981d980-e2a2-11ee-8bca-5190faa7db82.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.83 + 100.64.23.83 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.11.198 + 100.64.11.198 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.229 + 100.64.68.229 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710490009 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f981d980-e2a2-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490009 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f981d980-e2a2-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490009 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f981d980-e2a2-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490009 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f981d980-e2a2-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490009 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f981d980-e2a2-11ee-8bca-5190faa7db82 + + + INCIDENT_LINK + 1710490009 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f981d980-e2a2-11ee-8bca-5190faa7db82 + + + diff --git a/graph/incidents_graphml/f/f98631f0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f98631f0-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..913de25b45ad6248c3a85a944c911bc327a81035 --- /dev/null +++ b/graph/incidents_graphml/f/f98631f0-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.169 + 100.64.26.169 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178153 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f98631f0-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f9877020-9b17-11ee-a7a5-af0e8425a262.graphml b/graph/incidents_graphml/f/f9877020-9b17-11ee-a7a5-af0e8425a262.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1fa4aad6ce2d7c29695e050925cc1c8f0933d04a --- /dev/null +++ b/graph/incidents_graphml/f/f9877020-9b17-11ee-a7a5-af0e8425a262.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.149 + 100.64.31.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702623776 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9877020-9b17-11ee-a7a5-af0e8425a262 + + + diff --git a/graph/incidents_graphml/f/f99139e0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f99139e0-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..227905ffdd8bd0e15d5f292ad8cb63386ead3567 --- /dev/null +++ b/graph/incidents_graphml/f/f99139e0-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.178 + 100.64.46.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295011 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f99139e0-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f9992d80-3026-11ee-a433-a916fb2bb25a.graphml b/graph/incidents_graphml/f/f9992d80-3026-11ee-a433-a916fb2bb25a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..182dd1deec85790040d96129e898f29c429278d5 --- /dev/null +++ b/graph/incidents_graphml/f/f9992d80-3026-11ee-a433-a916fb2bb25a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.31 + 100.64.68.31 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1690865444 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9992d80-3026-11ee-a433-a916fb2bb25a + + + INCIDENT_LINK + 1690865444 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9992d80-3026-11ee-a433-a916fb2bb25a + + + diff --git a/graph/incidents_graphml/f/f99acb60-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/f99acb60-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb70f90992e1097039a823dc572fe2cccf987b72 --- /dev/null +++ b/graph/incidents_graphml/f/f99acb60-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.169 + 100.64.26.169 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178153 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f99acb60-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/f99dc910-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f99dc910-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8905b615076d7d00bcb72546139b057ec36db5b4 --- /dev/null +++ b/graph/incidents_graphml/f/f99dc910-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.108 + 100.64.79.108 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f99dc910-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f9a56a30-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/f9a56a30-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e9208248b51709b8627136c99874eeba3bd1d93 --- /dev/null +++ b/graph/incidents_graphml/f/f9a56a30-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.108 + 100.64.79.108 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662257526 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9a56a30-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/f9a7a530-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f9a7a530-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc7a38f79b2c2cfb3e90413a270cef7da4d99732 --- /dev/null +++ b/graph/incidents_graphml/f/f9a7a530-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.65 + 100.64.16.65 + [] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685598097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9a7a530-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/f9b1aff0-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/f9b1aff0-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7042e4a451bc54a4ccc7733c935bc4ee7ba793ad --- /dev/null +++ b/graph/incidents_graphml/f/f9b1aff0-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.55 + 100.64.79.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.40 + USER-0015-1612.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657950533 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9b1aff0-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950533 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9b1aff0-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/f9b52da0-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/f9b52da0-68d4-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17042677249be66d2eeb8e9c7323de53a90a816d --- /dev/null +++ b/graph/incidents_graphml/f/f9b52da0-68d4-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.50 + 100.64.41.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697097442 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9b52da0-68d4-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/f/f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41151b5f1d323003b04553cbd6b456104a8870d3 --- /dev/null +++ b/graph/incidents_graphml/f/f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.180 + 100.64.46.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295011 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f9b5fff0-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb4e1daf86c87546236ecf425b3b3e34ebe07480 --- /dev/null +++ b/graph/incidents_graphml/f/f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9b77c80-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f9ba5540-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f9ba5540-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e2eff93e76765c740a965b85130a4925334dff5 --- /dev/null +++ b/graph/incidents_graphml/f/f9ba5540-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.122 + 100.64.39.122 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696466512 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9ba5540-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/f/f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f.graphml b/graph/incidents_graphml/f/f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd1161f1147cea8d54f76e49cc5e9b3138514ecb --- /dev/null +++ b/graph/incidents_graphml/f/f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f.graphml @@ -0,0 +1,133 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.161 + 100.64.23.161 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.70.11 + 100.64.70.11 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + INCIDENT_LINK + 1711473986 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473986 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473986 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473986 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f + + + INCIDENT_LINK + 1711473986 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9bfdfe0-eb95-11ee-8f3a-6b2412cfa52f + + + diff --git a/graph/incidents_graphml/f/f9c2a740-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/f9c2a740-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b09d7f4d64053a1125a6851444e744c432e585a --- /dev/null +++ b/graph/incidents_graphml/f/f9c2a740-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.16.65 + 100.64.16.65 + [] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685598097 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9c2a740-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/f9c31050-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/f9c31050-68d4-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6676f4e31980012f41899a4f7b53529023a9615b --- /dev/null +++ b/graph/incidents_graphml/f/f9c31050-68d4-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.50 + 100.64.41.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697097442 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9c31050-68d4-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/f/f9c636b0-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f9c636b0-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edc7bf0fc0b8543d44e893137b745d71a9600de0 --- /dev/null +++ b/graph/incidents_graphml/f/f9c636b0-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.148 + 100.64.7.148 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274097 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9c636b0-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..925f4819621830d75a23385f183c79ccd84e6dc6 --- /dev/null +++ b/graph/incidents_graphml/f/f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295011 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9c6a1c0-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f9c72680-6317-11ee-bf7a-9334ddba6edc.graphml b/graph/incidents_graphml/f/f9c72680-6317-11ee-bf7a-9334ddba6edc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a96dbd94167e4c9581c4ab8efb2973cabc0b945 --- /dev/null +++ b/graph/incidents_graphml/f/f9c72680-6317-11ee-bf7a-9334ddba6edc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.39.122 + 100.64.39.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696466512 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9c72680-6317-11ee-bf7a-9334ddba6edc + + + diff --git a/graph/incidents_graphml/f/f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09a9b219f35cbdd0f46c28c39a4326945a882fc1 --- /dev/null +++ b/graph/incidents_graphml/f/f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.105 + 100.64.57.105 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695815824 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f9d05bb0-5d2c-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/f9d19f90-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/f9d19f90-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..754e6d9393f9f26df923cbba92cc2aa0786650c7 --- /dev/null +++ b/graph/incidents_graphml/f/f9d19f90-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.199 + 100.64.37.199 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718075781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9d19f90-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda.graphml b/graph/incidents_graphml/f/f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc15e92ff535a59035513ca4cc70b93ece088ba5 --- /dev/null +++ b/graph/incidents_graphml/f/f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.54 + USER-0015-1536.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.40.236 + 100.64.40.236 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.26.177 + 100.64.26.177 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.230 + 100.64.69.230 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + INCIDENT_LINK + 1713663561 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9d1a6a0-ff7f-11ee-b9e5-11c35e54feda + + + diff --git a/graph/incidents_graphml/f/f9d43650-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9d43650-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e97f4e7257e197fdcc5456e2d0a74b378a37b3b --- /dev/null +++ b/graph/incidents_graphml/f/f9d43650-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.182 + 100.64.46.182 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295011 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9d43650-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f9d46780-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/f9d46780-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f10d145522d276758201fbc491162378b3b4913 --- /dev/null +++ b/graph/incidents_graphml/f/f9d46780-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.148 + 100.64.7.148 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274097 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9d46780-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/f9daa150-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/f9daa150-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7867057291cd61dde4424a41b7e52e131e6d521a --- /dev/null +++ b/graph/incidents_graphml/f/f9daa150-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.21 + 100.64.16.21 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753942 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9daa150-4153-11ee-b2c3-cd25671e6ae8 + + + INCIDENT_LINK + 1692753942 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9daa150-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/f9e00150-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f9e00150-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e626bb7c9a869780973754c47638747e60eaed9 --- /dev/null +++ b/graph/incidents_graphml/f/f9e00150-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.188 + 100.64.24.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084918 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9e00150-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1.graphml b/graph/incidents_graphml/f/f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4027d2742301e7406e80539412cac0a9ec3b8a3f --- /dev/null +++ b/graph/incidents_graphml/f/f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.182 + 100.64.46.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697295011 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9e2dc50-6aa0-11ee-9c5c-c16a990fa6e1 + + + diff --git a/graph/incidents_graphml/f/f9e98830-70e4-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/f/f9e98830-70e4-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0df66935663690ade26e30610ce2fbb0c05f3d3e --- /dev/null +++ b/graph/incidents_graphml/f/f9e98830-70e4-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.72 + 100.64.68.72 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.73 + 100.64.68.73 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.29.154 + 100.64.29.154 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697983924 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + f9e98830-70e4-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/f/f9eb2a00-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f9eb2a00-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab20bec3dd33b292d3006c29caa0909d646457cd --- /dev/null +++ b/graph/incidents_graphml/f/f9eb2a00-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.16 + 100.64.91.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1675055241 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9eb2a00-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/f9eba180-22b8-11ee-8861-516dde03d998.graphml b/graph/incidents_graphml/f/f9eba180-22b8-11ee-8861-516dde03d998.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a322261318ebba5e218b85da4b4eb0f331783e61 --- /dev/null +++ b/graph/incidents_graphml/f/f9eba180-22b8-11ee-8861-516dde03d998.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689388835 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + f9eba180-22b8-11ee-8861-516dde03d998 + + + diff --git a/graph/incidents_graphml/f/f9f06020-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f9f06020-594c-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8857dd547548cae16038628516f767ca635309d4 --- /dev/null +++ b/graph/incidents_graphml/f/f9f06020-594c-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.115 + 100.64.71.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.49 + 100.64.1.49 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.18.227 + 100.64.18.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1667242266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9f06020-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9f06020-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9f06020-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + f9f06020-594c-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/f/f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a58ff30887f26674decb8a93095878e2f00f8e9 --- /dev/null +++ b/graph/incidents_graphml/f/f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.117 + 100.64.71.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1667242266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + f9f1bfb0-594c-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/f/f9f4c490-1f1b-11ee-9e2e-57c890ee02a2.graphml b/graph/incidents_graphml/f/f9f4c490-1f1b-11ee-9e2e-57c890ee02a2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c66a71bb1d8e0c0926a8f70f4c73d23c4ee2933 --- /dev/null +++ b/graph/incidents_graphml/f/f9f4c490-1f1b-11ee-9e2e-57c890ee02a2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.73 + 100.64.47.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688991551 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9f4c490-1f1b-11ee-9e2e-57c890ee02a2 + + + diff --git a/graph/incidents_graphml/f/f9f710e0-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/f9f710e0-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2748d5dcb302c957f1b23008677c17ef6bdf296 --- /dev/null +++ b/graph/incidents_graphml/f/f9f710e0-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.16 + 100.64.91.16 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675055241 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9f710e0-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/f9ff9740-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/f9ff9740-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a63f2a2d4525020a5d42aabc06f41e920937e6d --- /dev/null +++ b/graph/incidents_graphml/f/f9ff9740-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.188 + 100.64.24.188 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084918 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + f9ff9740-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/fa00fea0-1403-11ed-91bb-5f4a5e1f0902.graphml b/graph/incidents_graphml/f/fa00fea0-1403-11ed-91bb-5f4a5e1f0902.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e3098ccdf1dfc187ad26e422d1d89ab52538cfe --- /dev/null +++ b/graph/incidents_graphml/f/fa00fea0-1403-11ed-91bb-5f4a5e1f0902.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.252 + 100.64.70.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659624283 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa00fea0-1403-11ed-91bb-5f4a5e1f0902 + + + INCIDENT_LINK + 1659624283 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa00fea0-1403-11ed-91bb-5f4a5e1f0902 + + + diff --git a/graph/incidents_graphml/f/fa0721c0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/fa0721c0-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e34c82082d01db8c21bc85a8a5783f13dae6e99 --- /dev/null +++ b/graph/incidents_graphml/f/fa0721c0-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.165 + 100.64.32.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178154 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa0721c0-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/fa0f1ba0-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/f/fa0f1ba0-9e15-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf9e45c4f1c5351eec41222ac09060c1613d597b --- /dev/null +++ b/graph/incidents_graphml/f/fa0f1ba0-9e15-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.156 + 100.64.70.156 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.157 + 100.64.70.157 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.38.42 + 100.64.38.42 + ["Exploiting Host"] + 0.6203125 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.11.42 + 100.64.11.42 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.158 + 100.64.70.158 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.159 + 100.64.70.159 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.70.160 + 100.64.70.160 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.174 + 100.64.8.174 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952772 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f1ba0-9e15-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/f/fa0f9a30-1c97-11ee-b9c1-8f183b2e0424.graphml b/graph/incidents_graphml/f/fa0f9a30-1c97-11ee-b9c1-8f183b2e0424.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2916e79f61ea89f8c3613c5cfc02660a70f97c22 --- /dev/null +++ b/graph/incidents_graphml/f/fa0f9a30-1c97-11ee-b9c1-8f183b2e0424.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688714955 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f9a30-1c97-11ee-b9c1-8f183b2e0424 + + + INCIDENT_LINK + 1688714955 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa0f9a30-1c97-11ee-b9c1-8f183b2e0424 + + + diff --git a/graph/incidents_graphml/f/fa10ae60-9998-11ee-9c88-85e8bec5492c.graphml b/graph/incidents_graphml/f/fa10ae60-9998-11ee-9c88-85e8bec5492c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7eba22cf604e09fa8a65cde9410f593fd2d9a81e --- /dev/null +++ b/graph/incidents_graphml/f/fa10ae60-9998-11ee-9c88-85e8bec5492c.graphml @@ -0,0 +1,797 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.203 + 100.64.52.203 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.204 + 100.64.52.204 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.205 + 100.64.52.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.154 + USER-0015-1234.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.223 + 100.64.22.223 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.188 + 100.64.19.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.206 + 100.64.52.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.207 + 100.64.52.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.141 + 100.64.35.141 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.29 + 100.64.23.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.208 + 100.64.52.208 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.209 + 100.64.52.209 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.210 + 100.64.52.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + INCIDENT_LINK + 1702459280 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa10ae60-9998-11ee-9c88-85e8bec5492c + + + diff --git a/graph/incidents_graphml/f/fa21aea0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/fa21aea0-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac9b1288c1f14a59cd45cea318141fd9dd45fb15 --- /dev/null +++ b/graph/incidents_graphml/f/fa21aea0-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.165 + 100.64.32.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178154 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa21aea0-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/fa269a50-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/f/fa269a50-3249-11ef-8034-87bdea2d948c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92ea875352957cd9125ab48be686f8cc87710519 --- /dev/null +++ b/graph/incidents_graphml/f/fa269a50-3249-11ef-8034-87bdea2d948c.graphml @@ -0,0 +1,581 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.47 + 100.64.20.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.26.80 + 100.64.26.80 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.123 + 100.64.96.123 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.124 + 100.64.96.124 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.125 + 100.64.96.125 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.193 + 100.64.45.193 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.171 + 100.64.30.171 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.126 + USER-0015-2158.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.96.127 + USER-0015-2159.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.202 + 100.64.6.202 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa269a50-3249-11ef-8034-87bdea2d948c + + + diff --git a/graph/incidents_graphml/f/fa26c110-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fa26c110-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cf49efe005e8ab18fb6038d9efb66039f44f5fb --- /dev/null +++ b/graph/incidents_graphml/f/fa26c110-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa26c110-446a-11ee-9b56-b315e86f4666 + + + INCIDENT_LINK + 1693093674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa26c110-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fa297df0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fa297df0-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43755d42c4d85b7a3711bab1f51e686ec6510a2c --- /dev/null +++ b/graph/incidents_graphml/f/fa297df0-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.186 + 100.64.8.186 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855768 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa297df0-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/fa360350-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fa360350-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..935c9ac4f02ea038eb5c64850966442d465c0045 --- /dev/null +++ b/graph/incidents_graphml/f/fa360350-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093675 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa360350-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d22292f745dcc05e9d2871316b945279d45c66c0 --- /dev/null +++ b/graph/incidents_graphml/f/fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.100.124.228 + 10.100.124.228 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Windows Active Directory"] + + + HOST + 100.64.0.196 + 100.64.0.196 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687621027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621027 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa45d0c0-12a4-11ee-ab1f-2bdb6669e8cc + + + diff --git a/graph/incidents_graphml/f/fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6.graphml b/graph/incidents_graphml/f/fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54d1c10eba5649f7265b050f27406c84a7768e79 --- /dev/null +++ b/graph/incidents_graphml/f/fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.45 + 100.64.28.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.46 + 100.64.28.46 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.47 + 100.64.28.47 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.175 + 100.64.23.175 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + INCIDENT_LINK + 1690158065 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4a2060-29b7-11ee-b86f-6b6c9ebf54e6 + + + diff --git a/graph/incidents_graphml/f/fa4ff860-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fa4ff860-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..300626e17f6deff54f95168399cddfad32ebf33c --- /dev/null +++ b/graph/incidents_graphml/f/fa4ff860-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.39 + 100.64.34.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753943 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa4ff860-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fa567540-00b7-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/f/fa567540-00b7-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a972c0e44a4150aee957aa91b5cf8ea746a0f661 --- /dev/null +++ b/graph/incidents_graphml/f/fa567540-00b7-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.6 + 100.64.49.6 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1713797565 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa567540-00b7-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797565 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa567540-00b7-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797565 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa567540-00b7-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797565 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa567540-00b7-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/f/fa5683f0-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/f/fa5683f0-3249-11ef-8034-87bdea2d948c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e89c6405a9e3e94187f53648ee985356ec07968 --- /dev/null +++ b/graph/incidents_graphml/f/fa5683f0-3249-11ef-8034-87bdea2d948c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.216.185 + USER-0015-2160.example.internal + [] + 0.4375 + ["Precinct","Windows Active Directory"] + + + HOST + 172.18.12.139 + 172.18.12.139 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 172.25.116.1 + 172.25.116.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + INCIDENT_LINK + 1719247878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa5683f0-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa5683f0-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa5683f0-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247878 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa5683f0-3249-11ef-8034-87bdea2d948c + + + diff --git a/graph/incidents_graphml/f/fa5f88c0-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fa5f88c0-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..868134dd69d7c0ddbe3d417219904a6d9e0e11ac --- /dev/null +++ b/graph/incidents_graphml/f/fa5f88c0-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.39 + 100.64.34.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753943 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa5f88c0-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fa654c90-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/fa654c90-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a7fd8c91a12528ec9a0566f1889d5abbd75e846 --- /dev/null +++ b/graph/incidents_graphml/f/fa654c90-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.233 + USER-0015-1210.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375356 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa654c90-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/f/fa72c2a0-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fa72c2a0-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..970b7f3749a33f911fe4f2d3368e39dd022e8a83 --- /dev/null +++ b/graph/incidents_graphml/f/fa72c2a0-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.161 + 100.64.23.161 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753943 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa72c2a0-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fa80c850-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/f/fa80c850-0c8d-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c604723f05b1af48a65ed8b6b19ea93a5ec4d4ef --- /dev/null +++ b/graph/incidents_graphml/f/fa80c850-0c8d-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,97 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.84.147.49 + HOST-11973 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Windows Active Directory","Cortex XDR","Tenable Vulnerability Management"] + + + HOST + 100.64.69.57 + 100.64.69.57 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + INCIDENT_LINK + 1686951442 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + fa80c850-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951442 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + fa80c850-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951442 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + fa80c850-0c8d-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/f/fa84bb70-1068-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/f/fa84bb70-1068-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce40dae75f7c5c877e90ebf8424bc60f66aec3c7 --- /dev/null +++ b/graph/incidents_graphml/f/fa84bb70-1068-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.233 + USER-0015-1210.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687375356 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa84bb70-1068-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/f/fa88dea0-0c8d-11ee-af4a-2171e1d29da4.graphml b/graph/incidents_graphml/f/fa88dea0-0c8d-11ee-af4a-2171e1d29da4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eee96b66e0958313638e61d3c8846793f190d638 --- /dev/null +++ b/graph/incidents_graphml/f/fa88dea0-0c8d-11ee-af4a-2171e1d29da4.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.9 + USER-0015-1517.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1686951442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa88dea0-0c8d-11ee-af4a-2171e1d29da4 + + + INCIDENT_LINK + 1686951442 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa88dea0-0c8d-11ee-af4a-2171e1d29da4 + + + diff --git a/graph/incidents_graphml/f/fa8d3030-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/fa8d3030-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5dc7feabea63a7c62cb5e5ad0bf6adb7925305ce --- /dev/null +++ b/graph/incidents_graphml/f/fa8d3030-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.13 + 100.64.2.13 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fa8d3030-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f59fe8f577672c8b60212a01a6cd6e80faae471d --- /dev/null +++ b/graph/incidents_graphml/f/fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.117.96 + 192.168.117.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.20 + 100.64.80.20 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.21 + 100.64.80.21 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686675706 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675706 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675706 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675706 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa95e6b0-0a0b-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/f/fa9ad630-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fa9ad630-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d6401251b653340e33acd12ee71608292f236fc --- /dev/null +++ b/graph/incidents_graphml/f/fa9ad630-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.133 + 100.64.58.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa9ad630-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fa9c4b60-6157-11ee-a94f-2f3b333c7157.graphml b/graph/incidents_graphml/f/fa9c4b60-6157-11ee-a94f-2f3b333c7157.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d00e32a79c1be116ab85802f17f8d4181315c2d0 --- /dev/null +++ b/graph/incidents_graphml/f/fa9c4b60-6157-11ee-a94f-2f3b333c7157.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.13 + 100.64.2.13 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696274099 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fa9c4b60-6157-11ee-a94f-2f3b333c7157 + + + diff --git a/graph/incidents_graphml/f/fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e46fec95fdf6b43ea6a4d2033a7e28300aa0b17f --- /dev/null +++ b/graph/incidents_graphml/f/fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.11 + 100.64.39.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801659 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa9c7380-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fa9d59d0-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/fa9d59d0-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90c70ce2d441fabb7f0fe684b72a2050955073a8 --- /dev/null +++ b/graph/incidents_graphml/f/fa9d59d0-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.164 + 100.64.53.164 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fa9d59d0-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/fa9fa020-0a0a-11ee-9aea-c52880a9cb1e.graphml b/graph/incidents_graphml/f/fa9fa020-0a0a-11ee-9aea-c52880a9cb1e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c0d2358d1c1152454fce60834300297822118e4 --- /dev/null +++ b/graph/incidents_graphml/f/fa9fa020-0a0a-11ee-9aea-c52880a9cb1e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.17.88.185 + 10.17.88.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.15 + 100.64.80.15 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1686675276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa9fa020-0a0a-11ee-9aea-c52880a9cb1e + + + INCIDENT_LINK + 1686675276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fa9fa020-0a0a-11ee-9aea-c52880a9cb1e + + + diff --git a/graph/incidents_graphml/f/faa86ad0-4e47-11ee-89ef-5bfd6850a1bd.graphml b/graph/incidents_graphml/f/faa86ad0-4e47-11ee-89ef-5bfd6850a1bd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..172d150badb0c197467215e99ab91550a41e85db --- /dev/null +++ b/graph/incidents_graphml/f/faa86ad0-4e47-11ee-89ef-5bfd6850a1bd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.167 + 100.64.32.167 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694178155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + faa86ad0-4e47-11ee-89ef-5bfd6850a1bd + + + diff --git a/graph/incidents_graphml/f/faab02d0-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/faab02d0-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f684ded86ff488f068c807ba3f6532bd3ba77de6 --- /dev/null +++ b/graph/incidents_graphml/f/faab02d0-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.133 + 100.64.58.133 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020432 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + faab02d0-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/faad1140-7500-11ee-861f-33fd57670a9d.graphml b/graph/incidents_graphml/f/faad1140-7500-11ee-861f-33fd57670a9d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ef087f57bdb634422f2ab635fe2d403ce718800a --- /dev/null +++ b/graph/incidents_graphml/f/faad1140-7500-11ee-861f-33fd57670a9d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.164 + 100.64.53.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698435756 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + faad1140-7500-11ee-861f-33fd57670a9d + + + diff --git a/graph/incidents_graphml/f/faad3dc0-ff1f-11ed-9f06-15dc041567e3.graphml b/graph/incidents_graphml/f/faad3dc0-ff1f-11ed-9f06-15dc041567e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85603bee2e8d56e28f7a0759bd4da5a63ed7b039 --- /dev/null +++ b/graph/incidents_graphml/f/faad3dc0-ff1f-11ed-9f06-15dc041567e3.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.219 + 100.64.27.219 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.27.220 + 100.64.27.220 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.221 + 100.64.27.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.222 + 100.64.27.222 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.223 + 100.64.27.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.162 + 100.64.3.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.224 + 100.64.27.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.225 + 100.64.27.225 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.226 + 100.64.27.226 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faad3dc0-ff1f-11ed-9f06-15dc041567e3 + + + diff --git a/graph/incidents_graphml/f/faadb1c0-dfa1-11ee-9120-ff7b7094ac3d.graphml b/graph/incidents_graphml/f/faadb1c0-dfa1-11ee-9120-ff7b7094ac3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2f58ee92e76ba93f637d119908440439f344278 --- /dev/null +++ b/graph/incidents_graphml/f/faadb1c0-dfa1-11ee-9120-ff7b7094ac3d.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.253 + 100.64.65.253 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.27.197 + 100.64.27.197 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.49.145 + 100.64.49.145 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1710159728 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faadb1c0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159728 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faadb1c0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159728 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faadb1c0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159728 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faadb1c0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159728 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faadb1c0-dfa1-11ee-9120-ff7b7094ac3d + + + INCIDENT_LINK + 1710159728 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faadb1c0-dfa1-11ee-9120-ff7b7094ac3d + + + diff --git a/graph/incidents_graphml/f/fab049a0-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fab049a0-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82706c4c078ffb99d7ae4ef4dd4a608ccccdd256 --- /dev/null +++ b/graph/incidents_graphml/f/fab049a0-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.11 + 100.64.39.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fab049a0-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fab54570-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fab54570-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8b5dd4e279d1fbda7413520407b7a7daa7cbc68 --- /dev/null +++ b/graph/incidents_graphml/f/fab54570-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.116 + 100.64.55.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093675 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fab54570-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fab7d410-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fab7d410-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7223c1dfea7a06979278b14d7a3c252dd9740c8f --- /dev/null +++ b/graph/incidents_graphml/f/fab7d410-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.168 + 100.64.30.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020432 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fab7d410-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fab96a20-505d-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/fab96a20-505d-11ee-a936-57e582280eb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..996e56ecaeb37973ecdd83e690553daaa644d907 --- /dev/null +++ b/graph/incidents_graphml/f/fab96a20-505d-11ee-a936-57e582280eb3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694407506 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fab96a20-505d-11ee-a936-57e582280eb3 + + + diff --git a/graph/incidents_graphml/f/fabc1b10-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/fabc1b10-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c61bdea4b1417e53db7056602d8c1fbc2ed01ab --- /dev/null +++ b/graph/incidents_graphml/f/fabc1b10-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.56 + 100.64.79.56 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.41 + 100.64.72.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.57 + 100.64.79.57 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657950535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabc1b10-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabc1b10-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabc1b10-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950535 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabc1b10-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/fabd2b60-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fabd2b60-15b5-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..916ade3a88915fc9a19fd125d8fb5518e37fcadd --- /dev/null +++ b/graph/incidents_graphml/f/fabd2b60-15b5-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.127.220 + 172.21.127.220 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall","Windows Active Directory","Barracuda WAF"] + + + HOST + 100.64.95.99 + 100.64.95.99 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.100 + 100.64.95.100 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.86.175 + 100.64.86.175 + ["Exploiting Target"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.22 + 100.64.89.22 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105681 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fabd2b60-15b5-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/f/fac2c190-ff1f-11ed-9f06-15dc041567e3.graphml b/graph/incidents_graphml/f/fac2c190-ff1f-11ed-9f06-15dc041567e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdabb9bf0f6205f63f8b84fdfd4b66b8a7cb711d --- /dev/null +++ b/graph/incidents_graphml/f/fac2c190-ff1f-11ed-9f06-15dc041567e3.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.129 + 100.64.18.129 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.126 + 100.64.9.126 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.235 + 100.64.27.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.236 + 100.64.27.236 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.237 + 100.64.27.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.68 + 100.64.21.68 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.27.238 + 100.64.27.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.239 + 100.64.27.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.27.240 + 100.64.27.240 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + INCIDENT_LINK + 1685474833 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fac2c190-ff1f-11ed-9f06-15dc041567e3 + + + diff --git a/graph/incidents_graphml/f/fac2f380-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fac2f380-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6586ab65584670578b13dc218979b47d81f1f49b --- /dev/null +++ b/graph/incidents_graphml/f/fac2f380-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.101 + 100.64.11.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355177 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fac2f380-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/fac5e500-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fac5e500-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e50e8285919db3b974cf48aef80625572a1f8ba --- /dev/null +++ b/graph/incidents_graphml/f/fac5e500-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.163 + 100.64.52.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855769 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fac5e500-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/fac604e0-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fac604e0-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..946d03e3acdb0d78fc2c474bf0b86a56eddeac26 --- /dev/null +++ b/graph/incidents_graphml/f/fac604e0-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.168 + 100.64.30.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fac604e0-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/faccec20-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/faccec20-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1928b8b7d225aa7799a23297d7a68cbae57fecef --- /dev/null +++ b/graph/incidents_graphml/f/faccec20-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.203 + 100.64.8.203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093676 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + faccec20-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fad09f20-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/fad09f20-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b75f49d24be39f65b0a18a4fd08f4924fdf67fb --- /dev/null +++ b/graph/incidents_graphml/f/fad09f20-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.103 + 100.64.74.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688351173 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fad09f20-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/fad110d0-505d-11ee-a936-57e582280eb3.graphml b/graph/incidents_graphml/f/fad110d0-505d-11ee-a936-57e582280eb3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..178fa580874c7da7b0507982399126859090c376 --- /dev/null +++ b/graph/incidents_graphml/f/fad110d0-505d-11ee-a936-57e582280eb3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.102 + 100.64.16.102 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694407506 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fad110d0-505d-11ee-a936-57e582280eb3 + + + diff --git a/graph/incidents_graphml/f/fadb68d0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fadb68d0-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..019ff1f1878daace7eddf37c34ecdf0cf6385a17 --- /dev/null +++ b/graph/incidents_graphml/f/fadb68d0-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.163 + 100.64.52.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855769 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fadb68d0-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/faeae5c0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/faeae5c0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a34b3210e4dbacb49364d420459474d99bab10b3 --- /dev/null +++ b/graph/incidents_graphml/f/faeae5c0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924191 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + faeae5c0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/faf7af20-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/faf7af20-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc25c825697d03e37e18564d110cc6c240634a0d --- /dev/null +++ b/graph/incidents_graphml/f/faf7af20-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.103 + 100.64.74.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688351173 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + faf7af20-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/faf9d250-71e1-11ed-b9a8-2b933f6712c2.graphml b/graph/incidents_graphml/f/faf9d250-71e1-11ed-b9a8-2b933f6712c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bef8eae20038699b85a189db5f0193b6cecd0567 --- /dev/null +++ b/graph/incidents_graphml/f/faf9d250-71e1-11ed-b9a8-2b933f6712c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.103 + 100.64.82.103 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.170 + 100.64.72.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.82.104 + 100.64.82.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1669945091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faf9d250-71e1-11ed-b9a8-2b933f6712c2 + + + INCIDENT_LINK + 1669945091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faf9d250-71e1-11ed-b9a8-2b933f6712c2 + + + INCIDENT_LINK + 1669945091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faf9d250-71e1-11ed-b9a8-2b933f6712c2 + + + INCIDENT_LINK + 1669945091 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + faf9d250-71e1-11ed-b9a8-2b933f6712c2 + + + diff --git a/graph/incidents_graphml/f/fafa4f10-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fafa4f10-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c59ecc321049866d0c41ae4031141e88ca417a2 --- /dev/null +++ b/graph/incidents_graphml/f/fafa4f10-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.254 + 100.64.7.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fafa4f10-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fb112420-a79e-11ee-a7c6-87832a38b323.graphml b/graph/incidents_graphml/f/fb112420-a79e-11ee-a7c6-87832a38b323.graphml new file mode 100644 index 0000000000000000000000000000000000000000..895042d89f2d2eb11b426bfbd556efa71f157156 --- /dev/null +++ b/graph/incidents_graphml/f/fb112420-a79e-11ee-a7c6-87832a38b323.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.199 + 100.64.10.199 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.200 + 100.64.10.200 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.201 + 100.64.10.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Azure Security"] + + + HOST + 100.64.10.202 + 100.64.10.202 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.203 + 100.64.10.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.204 + 100.64.10.204 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.205 + 100.64.10.205 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.206 + 100.64.10.206 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.207 + 100.64.10.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.208 + 100.64.10.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.140 + 100.64.3.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.209 + 100.64.10.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.210 + 100.64.10.210 + ["Exploiting Target","Exploiting Host"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.211 + 100.64.10.211 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.212 + 100.64.10.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.213 + 100.64.10.213 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.214 + 100.64.10.214 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + INCIDENT_LINK + 1704001175 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb112420-a79e-11ee-a7c6-87832a38b323 + + + diff --git a/graph/incidents_graphml/f/fb1eac30-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb1eac30-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ac73010bb9734c22dbcbd2563d55b51b3245dec --- /dev/null +++ b/graph/incidents_graphml/f/fb1eac30-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.80 + 100.64.65.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020433 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb1eac30-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fb2f60f0-1948-11ee-8b71-f9525f65ac72.graphml b/graph/incidents_graphml/f/fb2f60f0-1948-11ee-8b71-f9525f65ac72.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e28bc0f24cc994cb43f7ac60f08d82fa5310f91a --- /dev/null +++ b/graph/incidents_graphml/f/fb2f60f0-1948-11ee-8b71-f9525f65ac72.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.105 + 100.64.74.105 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688351174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb2f60f0-1948-11ee-8b71-f9525f65ac72 + + + diff --git a/graph/incidents_graphml/f/fb308680-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb308680-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4be342a7050b051e1037e3d19a6cdaa7fe20d266 --- /dev/null +++ b/graph/incidents_graphml/f/fb308680-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.80 + 100.64.65.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb308680-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fb34a550-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fb34a550-15b5-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc2de5ebf1e2b8366595ab44e9d0877cd6da37a8 --- /dev/null +++ b/graph/incidents_graphml/f/fb34a550-15b5-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.66.75 + 172.31.66.75 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.86.147 + 100.64.86.147 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1716105682 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb34a550-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105682 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb34a550-15b5-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/f/fb35c500-6e78-11ee-9076-51a308ac33b9.graphml b/graph/incidents_graphml/f/fb35c500-6e78-11ee-9076-51a308ac33b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7ab47c822b8f156fd26788efb4e63ca27d5dcdb --- /dev/null +++ b/graph/incidents_graphml/f/fb35c500-6e78-11ee-9076-51a308ac33b9.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.176 + 100.64.15.176 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.177 + 100.64.15.177 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.178 + 100.64.15.178 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.179 + 100.64.15.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.180 + USER-0015-1207.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.181 + 100.64.15.181 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.182 + 100.64.15.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.183 + 100.64.15.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.114 + USER-0015-1204.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.184 + 100.64.15.184 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.185 + 100.64.15.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.186 + 100.64.15.186 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.187 + 100.64.15.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.188 + 100.64.15.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.189 + 100.64.15.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.190 + 100.64.15.190 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.191 + 100.64.15.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.192 + 100.64.15.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.193 + 100.64.15.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.194 + 100.64.15.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + INCIDENT_LINK + 1697717638 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb35c500-6e78-11ee-9076-51a308ac33b9 + + + diff --git a/graph/incidents_graphml/f/fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7.graphml b/graph/incidents_graphml/f/fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5a7fe256e6468985b1caa6b23afce792b7277e7 --- /dev/null +++ b/graph/incidents_graphml/f/fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.62 + 100.64.36.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.203 + 100.64.39.203 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.65 + 100.64.21.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.204 + 100.64.39.204 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + INCIDENT_LINK + 1686704483 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb375b60-0a4e-11ee-8254-9ff4ea1b8ad7 + + + diff --git a/graph/incidents_graphml/f/fb384b30-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fb384b30-68d4-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c56e88e6e471cff889e7f2dae0390075d90218e3 --- /dev/null +++ b/graph/incidents_graphml/f/fb384b30-68d4-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.52 + 100.64.41.52 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697097445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb384b30-68d4-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/f/fb4287e0-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb4287e0-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66c33d0fa786f8f799aca37780bec6852f2e4fc8 --- /dev/null +++ b/graph/incidents_graphml/f/fb4287e0-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020433 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb4287e0-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fb47db90-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fb47db90-68d4-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..83f6c719725dbb8d4bbf02af1373f4f92caa2b9d --- /dev/null +++ b/graph/incidents_graphml/f/fb47db90-68d4-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.52 + 100.64.41.52 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697097445 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb47db90-68d4-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/f/fb498c30-2303-11ef-b8e2-a700e0b31057.graphml b/graph/incidents_graphml/f/fb498c30-2303-11ef-b8e2-a700e0b31057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f9b2c79b8d58db1340b7cb494958d2f14be1983 --- /dev/null +++ b/graph/incidents_graphml/f/fb498c30-2303-11ef-b8e2-a700e0b31057.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717568548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb498c30-2303-11ef-b8e2-a700e0b31057 + + + diff --git a/graph/incidents_graphml/f/fb554c90-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fb554c90-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b52350c98505a7afec49921e61ea9da664ced2fe --- /dev/null +++ b/graph/incidents_graphml/f/fb554c90-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.81 + 100.64.65.81 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020433 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fb554c90-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fb587670-15b4-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fb587670-15b4-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a29176bee7a0597b1678a6a71a81cd9f48407fe --- /dev/null +++ b/graph/incidents_graphml/f/fb587670-15b4-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,243 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.73 + 100.64.95.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.67.107 + 100.64.67.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.229 + 100.64.2.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.92 + 100.64.65.92 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.7.131 + 100.64.7.131 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.74 + 100.64.95.74 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105252 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb587670-15b4-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/f/fb588050-2303-11ef-b8e2-a700e0b31057.graphml b/graph/incidents_graphml/f/fb588050-2303-11ef-b8e2-a700e0b31057.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0db23672f3f5271dd4e08f02690196cb11e2ae8 --- /dev/null +++ b/graph/incidents_graphml/f/fb588050-2303-11ef-b8e2-a700e0b31057.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717568548 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb588050-2303-11ef-b8e2-a700e0b31057 + + + diff --git a/graph/incidents_graphml/f/fb5dcec0-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fb5dcec0-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..171dec608cd8d50d3aa7f5f0137a4bf8c95132a1 --- /dev/null +++ b/graph/incidents_graphml/f/fb5dcec0-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.95 + 100.64.39.95 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920458 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb5dcec0-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fb638b40-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fb638b40-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c1401581243830cfbe2bb22aee5ef44aea31ad60 --- /dev/null +++ b/graph/incidents_graphml/f/fb638b40-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.41 + 100.64.34.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753945 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb638b40-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fb654ea0-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/f/fb654ea0-3fac-11ef-931a-1d289e4afac0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..078cadba6d78dc022ecab17b8513cb5b0c1b7e19 --- /dev/null +++ b/graph/incidents_graphml/f/fb654ea0-3fac-11ef-931a-1d289e4afac0.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.156 + 100.64.95.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.237 + 100.64.45.237 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.1 + 100.64.30.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.228 + 100.64.3.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.157 + 100.64.95.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.158 + 100.64.95.158 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.159 + 100.64.95.159 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.160 + 100.64.95.160 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb654ea0-3fac-11ef-931a-1d289e4afac0 + + + diff --git a/graph/incidents_graphml/f/fb6e8490-9e15-11ee-a5ab-8550688be6fd.graphml b/graph/incidents_graphml/f/fb6e8490-9e15-11ee-a5ab-8550688be6fd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..957bed255a15ac0ae8c23cb2e8a2f139925726b2 --- /dev/null +++ b/graph/incidents_graphml/f/fb6e8490-9e15-11ee-a5ab-8550688be6fd.graphml @@ -0,0 +1,121 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.11.42 + 100.64.11.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.70.158 + 100.64.70.158 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702952774 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fb6e8490-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952774 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fb6e8490-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952774 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fb6e8490-9e15-11ee-a5ab-8550688be6fd + + + INCIDENT_LINK + 1702952774 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fb6e8490-9e15-11ee-a5ab-8550688be6fd + + + diff --git a/graph/incidents_graphml/f/fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6.graphml b/graph/incidents_graphml/f/fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e5cc0f8791bdd7796271b287a03420d2fc0b012 --- /dev/null +++ b/graph/incidents_graphml/f/fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6.graphml @@ -0,0 +1,661 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.204 + 100.64.40.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.205 + 100.64.40.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.206 + 100.64.40.206 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.207 + 100.64.40.207 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.208 + 100.64.40.208 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + HOST-2906 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.209 + 100.64.40.209 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.52 + 100.64.16.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.89 + 100.64.12.89 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.210 + 100.64.40.210 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.211 + 100.64.40.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.212 + 100.64.40.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.213 + 100.64.40.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.214 + 100.64.40.214 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + INCIDENT_LINK + 1702598010 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb71ab30-9adb-11ee-a9ab-0bd9fddee9c6 + + + diff --git a/graph/incidents_graphml/f/fb728f40-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fb728f40-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2dfce0e6dae626605acaf4f7745def325db824c7 --- /dev/null +++ b/graph/incidents_graphml/f/fb728f40-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.97 + 100.64.33.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920458 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb728f40-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fb73d840-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fb73d840-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5a95b1ff423d6061751ffcdf803c7a8a785ab0e --- /dev/null +++ b/graph/incidents_graphml/f/fb73d840-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.238 + 100.64.8.238 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855770 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb73d840-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/fb742d10-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fb742d10-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9cedd030a088e47693f859d33869e99409ba780 --- /dev/null +++ b/graph/incidents_graphml/f/fb742d10-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.41 + 100.64.34.41 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753945 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb742d10-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fb7a0760-2df5-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/f/fb7a0760-2df5-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5335f7161fe7f746c48517f445b5462d7f289873 --- /dev/null +++ b/graph/incidents_graphml/f/fb7a0760-2df5-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,367 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.1 + 100.64.54.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.2 + 100.64.54.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.128 + 100.64.39.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.3 + 100.64.54.3 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.4 + 100.64.54.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.5 + 100.64.54.5 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.6 + 100.64.54.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.7 + 100.64.54.7 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.8 + 100.64.54.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + INCIDENT_LINK + 1690624500 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb7a0760-2df5-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/f/fb7ea300-3fac-11ef-931a-1d289e4afac0.graphml b/graph/incidents_graphml/f/fb7ea300-3fac-11ef-931a-1d289e4afac0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91aae89833bdfd49b43d7788dd9eb68612c6b5c6 --- /dev/null +++ b/graph/incidents_graphml/f/fb7ea300-3fac-11ef-931a-1d289e4afac0.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.156 + USER-0015-2137.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.14.166 + 100.64.14.166 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.76 + USER-0015-2138.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.166 + 100.64.95.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.95.167 + 100.64.95.167 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + INCIDENT_LINK + 1720719765 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb7ea300-3fac-11ef-931a-1d289e4afac0 + + + diff --git a/graph/incidents_graphml/f/fb834190-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fb834190-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44988b0794b515de3cc08252a7a042db6e5c386b --- /dev/null +++ b/graph/incidents_graphml/f/fb834190-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.132 + 100.64.7.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb834190-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/f/fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c05ec889fa8c86fe56de661fb9391e21f062294 --- /dev/null +++ b/graph/incidents_graphml/f/fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.132 + 100.64.7.132 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695855770 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb92d1f0-5d89-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/f/fb92e890-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fb92e890-4d9c-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b886d73c6b98e14ef9ac724783bbd0ad688b043e --- /dev/null +++ b/graph/incidents_graphml/f/fb92e890-4d9c-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.88 + 100.64.59.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694104712 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fb92e890-4d9c-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/f/fb969280-23a1-11ee-b3c4-1b81ee59f0d7.graphml b/graph/incidents_graphml/f/fb969280-23a1-11ee-b3c4-1b81ee59f0d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cc57dd901e6a52029e9614ed55de980ab3917ed --- /dev/null +++ b/graph/incidents_graphml/f/fb969280-23a1-11ee-b3c4-1b81ee59f0d7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.231 + 100.64.24.231 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1689488911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb969280-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488911 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fb969280-23a1-11ee-b3c4-1b81ee59f0d7 + + + diff --git a/graph/incidents_graphml/f/fb9de960-00b7-11ef-8b56-b9c5ad676a8a.graphml b/graph/incidents_graphml/f/fb9de960-00b7-11ef-8b56-b9c5ad676a8a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dd09e2ada3ac235bd26f202ae40865c588468c8 --- /dev/null +++ b/graph/incidents_graphml/f/fb9de960-00b7-11ef-8b56-b9c5ad676a8a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.110 + 100.64.46.110 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1713797567 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb9de960-00b7-11ef-8b56-b9c5ad676a8a + + + INCIDENT_LINK + 1713797567 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fb9de960-00b7-11ef-8b56-b9c5ad676a8a + + + diff --git a/graph/incidents_graphml/f/fbaa2350-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fbaa2350-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7ac8bc98168586954fd7a41bc9104c08cdc2b9d --- /dev/null +++ b/graph/incidents_graphml/f/fbaa2350-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.236 + 100.64.26.236 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020434 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbaa2350-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fbb5b0d0-2df5-11ee-ad46-05b36c64c936.graphml b/graph/incidents_graphml/f/fbb5b0d0-2df5-11ee-ad46-05b36c64c936.graphml new file mode 100644 index 0000000000000000000000000000000000000000..afd8e146acd90eb059f82027714bc70cde2421c2 --- /dev/null +++ b/graph/incidents_graphml/f/fbb5b0d0-2df5-11ee-ad46-05b36c64c936.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.1 + 100.64.54.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690624501 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbb5b0d0-2df5-11ee-ad46-05b36c64c936 + + + diff --git a/graph/incidents_graphml/f/fbbaec30-7139-11ee-9ef2-d92876eea5ab.graphml b/graph/incidents_graphml/f/fbbaec30-7139-11ee-9ef2-d92876eea5ab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc95a41af03c7a88f3fc72fccbbf8c3e6f36ed9e --- /dev/null +++ b/graph/incidents_graphml/f/fbbaec30-7139-11ee-9ef2-d92876eea5ab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.122 + 100.64.43.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698020434 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbbaec30-7139-11ee-9ef2-d92876eea5ab + + + diff --git a/graph/incidents_graphml/f/fbbb7c30-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fbbb7c30-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9c7d4f144e32290f7027bc88902df1def056c8d --- /dev/null +++ b/graph/incidents_graphml/f/fbbb7c30-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.127 + 100.64.11.127 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924192 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbbb7c30-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fbc62170-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/fbc62170-01e1-11ef-a2c7-1dd1210cf0bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0636c6f301ab6417cab7e178d785ac6faa9788a5 --- /dev/null +++ b/graph/incidents_graphml/f/fbc62170-01e1-11ef-a2c7-1dd1210cf0bf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713925557 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbc62170-01e1-11ef-a2c7-1dd1210cf0bf + + + diff --git a/graph/incidents_graphml/f/fbc65f20-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/fbc65f20-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..031d93c02605f5d21b057dcfa1ca797d3dbddb0b --- /dev/null +++ b/graph/incidents_graphml/f/fbc65f20-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.58 + 100.64.79.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657950537 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbc65f20-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950537 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbc65f20-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/fbcac8b0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fbcac8b0-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed5f1d0374ef46e16bf14c1c285fb0928a88f9f8 --- /dev/null +++ b/graph/incidents_graphml/f/fbcac8b0-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.241 + 100.64.9.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015059 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbcac8b0-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fbcd2270-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/f/fbcd2270-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d768d02918a020adde5f700ca53b13c97b995122 --- /dev/null +++ b/graph/incidents_graphml/f/fbcd2270-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.238 + 100.64.19.238 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1690153772 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbcd2270-29ad-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690153772 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbcd2270-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/f/fbd04630-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/f/fbd04630-4522-11ef-b505-f5f313488713.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1818c9fdfdf7e80ea532b208402ce64330b03597 --- /dev/null +++ b/graph/incidents_graphml/f/fbd04630-4522-11ef-b505-f5f313488713.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.241.150 + USER-0015-2025.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.86.252 + 100.64.86.252 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721320202 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbd04630-4522-11ef-b505-f5f313488713 + + + INCIDENT_LINK + 1721320202 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbd04630-4522-11ef-b505-f5f313488713 + + + diff --git a/graph/incidents_graphml/f/fbd55fd0-29ad-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/f/fbd55fd0-29ad-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab645c5ede42da4b56e622f9278b3df1940943ca --- /dev/null +++ b/graph/incidents_graphml/f/fbd55fd0-29ad-11ee-9959-8506340212c8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.19.238 + 100.64.19.238 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690153772 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fbd55fd0-29ad-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/f/fbd93440-01e1-11ef-a2c7-1dd1210cf0bf.graphml b/graph/incidents_graphml/f/fbd93440-01e1-11ef-a2c7-1dd1210cf0bf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b494e70032a9a3673fca8dbc0ea8289ddd8cfcb8 --- /dev/null +++ b/graph/incidents_graphml/f/fbd93440-01e1-11ef-a2c7-1dd1210cf0bf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.151 + 100.64.39.151 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713925557 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbd93440-01e1-11ef-a2c7-1dd1210cf0bf + + + diff --git a/graph/incidents_graphml/f/fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90ce9cc60730d51662345b922999012c3a220109 --- /dev/null +++ b/graph/incidents_graphml/f/fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.159 + 100.64.9.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbdabfe0-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/fbdc5f80-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/fbdc5f80-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..900c333d445cb3b18757c38e496374af064a139d --- /dev/null +++ b/graph/incidents_graphml/f/fbdc5f80-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.7.67 + 100.64.7.67 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685598101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fbdc5f80-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/fbe17e50-ffeb-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/f/fbe17e50-ffeb-11ed-97eb-05d23f72b81e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6718c66f9d04113c4fcbbb007718eabbfa1874ea --- /dev/null +++ b/graph/incidents_graphml/f/fbe17e50-ffeb-11ed-97eb-05d23f72b81e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.44.245 + 100.64.44.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685562452 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbe17e50-ffeb-11ed-97eb-05d23f72b81e + + + diff --git a/graph/incidents_graphml/f/fbe20a10-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fbe20a10-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a89c51fbf329b940c191519a1231b9fb7563605 --- /dev/null +++ b/graph/incidents_graphml/f/fbe20a10-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.231 + 100.64.10.231 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753945 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbe20a10-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fbe26810-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fbe26810-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17c795dd09ce19a8f5624455a042a8f83d9b4500 --- /dev/null +++ b/graph/incidents_graphml/f/fbe26810-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.97 + 100.64.39.97 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920459 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbe26810-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a8250f71f6609ff406a8e99e6dd3e0f7774f31b --- /dev/null +++ b/graph/incidents_graphml/f/fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.14 + 100.64.9.14 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbe7d0c0-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fbe96db0-1403-11ed-91bb-5f4a5e1f0902.graphml b/graph/incidents_graphml/f/fbe96db0-1403-11ed-91bb-5f4a5e1f0902.graphml new file mode 100644 index 0000000000000000000000000000000000000000..535a9dfc88c81a6ec942eac5da5c736e43667fc3 --- /dev/null +++ b/graph/incidents_graphml/f/fbe96db0-1403-11ed-91bb-5f4a5e1f0902.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.5 + 100.64.76.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.6 + 100.64.76.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659624286 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbe96db0-1403-11ed-91bb-5f4a5e1f0902 + + + INCIDENT_LINK + 1659624286 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbe96db0-1403-11ed-91bb-5f4a5e1f0902 + + + diff --git a/graph/incidents_graphml/f/fbe9c880-06e3-11ef-a25f-979d2687f044.graphml b/graph/incidents_graphml/f/fbe9c880-06e3-11ef-a25f-979d2687f044.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50f221c4ce35d396e9394ccff042c93521fb1297 --- /dev/null +++ b/graph/incidents_graphml/f/fbe9c880-06e3-11ef-a25f-979d2687f044.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.63 + 100.64.17.63 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714476172 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbe9c880-06e3-11ef-a25f-979d2687f044 + + + diff --git a/graph/incidents_graphml/f/fbf26da0-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fbf26da0-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff6c7a7b38dab9d1da51c92a68e10fdac2849d21 --- /dev/null +++ b/graph/incidents_graphml/f/fbf26da0-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.97 + 100.64.39.97 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920459 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbf26da0-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fbf51730-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fbf51730-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66775e62e6e1d63a0a7428982c8d07a289aca3e6 --- /dev/null +++ b/graph/incidents_graphml/f/fbf51730-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.132 + 100.64.49.132 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488191 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbf51730-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccb8d881c2ee2d5ac05a5a455232dff336679f11 --- /dev/null +++ b/graph/incidents_graphml/f/fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.96 + 100.64.28.96 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801661 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbf6fa70-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fbf71e30-1445-11ef-8b63-6b6087068682.graphml b/graph/incidents_graphml/f/fbf71e30-1445-11ef-8b63-6b6087068682.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69cfbfa45f13792440ec7ebb1ebc55c5a9c95c89 --- /dev/null +++ b/graph/incidents_graphml/f/fbf71e30-1445-11ef-8b63-6b6087068682.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.106 + 100.64.47.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715947628 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbf71e30-1445-11ef-8b63-6b6087068682 + + + diff --git a/graph/incidents_graphml/f/fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90.graphml b/graph/incidents_graphml/f/fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..434b29758f1de1a39c62896d5b1bf5caf3d7ef56 --- /dev/null +++ b/graph/incidents_graphml/f/fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.159 + 100.64.9.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691084921 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fbf76fa0-3225-11ee-8ce2-1f9d9a95bd90 + + + diff --git a/graph/incidents_graphml/f/fbfb5930-003e-11ee-a334-5be386c18109.graphml b/graph/incidents_graphml/f/fbfb5930-003e-11ee-a334-5be386c18109.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6db7cc0f29a2c2ab6f8f470948c6bf61e831b7fa --- /dev/null +++ b/graph/incidents_graphml/f/fbfb5930-003e-11ee-a334-5be386c18109.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.67 + 100.64.16.67 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685598101 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfb5930-003e-11ee-a334-5be386c18109 + + + diff --git a/graph/incidents_graphml/f/fbfbcb70-683d-11ed-96b7-d9d8859696d0.graphml b/graph/incidents_graphml/f/fbfbcb70-683d-11ed-96b7-d9d8859696d0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c14a9bf51bde376d8639ad16a54d6d40a42482a --- /dev/null +++ b/graph/incidents_graphml/f/fbfbcb70-683d-11ed-96b7-d9d8859696d0.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.40 + 100.64.71.40 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.73.91 + 100.64.73.91 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.33.67 + 100.64.33.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1668885094 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfbcb70-683d-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885094 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfbcb70-683d-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885094 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfbcb70-683d-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885094 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfbcb70-683d-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885094 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfbcb70-683d-11ed-96b7-d9d8859696d0 + + + INCIDENT_LINK + 1668885094 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfbcb70-683d-11ed-96b7-d9d8859696d0 + + + diff --git a/graph/incidents_graphml/f/fbfdcb50-3249-11ef-8034-87bdea2d948c.graphml b/graph/incidents_graphml/f/fbfdcb50-3249-11ef-8034-87bdea2d948c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e033b6eefaa1bdb9a962325024368576bb79ee15 --- /dev/null +++ b/graph/incidents_graphml/f/fbfdcb50-3249-11ef-8034-87bdea2d948c.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.96.133 + 100.64.96.133 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.96.134 + 100.64.96.134 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719247881 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfdcb50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247881 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfdcb50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247881 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfdcb50-3249-11ef-8034-87bdea2d948c + + + INCIDENT_LINK + 1719247881 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fbfdcb50-3249-11ef-8034-87bdea2d948c + + + diff --git a/graph/incidents_graphml/f/fbff8d10-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fbff8d10-4d9c-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a28cab28e9a7f4facc1c9cae2bc62132f3717cae --- /dev/null +++ b/graph/incidents_graphml/f/fbff8d10-4d9c-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.207 + 100.64.14.207 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694104713 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fbff8d10-4d9c-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/f/fc02ad00-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fc02ad00-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..236e20b34e257d328e1a001617a1e6e3e008faba --- /dev/null +++ b/graph/incidents_graphml/f/fc02ad00-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.120 + 100.64.55.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc02ad00-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fc061d50-ffeb-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/f/fc061d50-ffeb-11ed-97eb-05d23f72b81e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2c8b2ed5995a2e2f8bfbbb24fc908b6760a1156 --- /dev/null +++ b/graph/incidents_graphml/f/fc061d50-ffeb-11ed-97eb-05d23f72b81e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.131 + 100.64.37.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685562453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc061d50-ffeb-11ed-97eb-05d23f72b81e + + + diff --git a/graph/incidents_graphml/f/fc07b4d0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fc07b4d0-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b46b4c0d81c9698b448760b3e4984c3195794bf0 --- /dev/null +++ b/graph/incidents_graphml/f/fc07b4d0-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.132 + 100.64.49.132 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc07b4d0-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fc0cd8a0-1145-11ee-aac5-6731911fd461.graphml b/graph/incidents_graphml/f/fc0cd8a0-1145-11ee-aac5-6731911fd461.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd84b89c91f24ea2cd604734248ae5b4b8c70b92 --- /dev/null +++ b/graph/incidents_graphml/f/fc0cd8a0-1145-11ee-aac5-6731911fd461.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.107 + 100.64.10.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.2 + 100.64.71.2 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687470277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc0cd8a0-1145-11ee-aac5-6731911fd461 + + + INCIDENT_LINK + 1687470277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc0cd8a0-1145-11ee-aac5-6731911fd461 + + + diff --git a/graph/incidents_graphml/f/fc0d94b0-435e-11ef-9e66-fd84d5bf3736.graphml b/graph/incidents_graphml/f/fc0d94b0-435e-11ef-9e66-fd84d5bf3736.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b6097f93b27c4c172334f6093858654cc11db8d8 --- /dev/null +++ b/graph/incidents_graphml/f/fc0d94b0-435e-11ef-9e66-fd84d5bf3736.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.73 + 100.64.28.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.74 + 100.64.28.74 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721126070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc0d94b0-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc0d94b0-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc0d94b0-435e-11ef-9e66-fd84d5bf3736 + + + INCIDENT_LINK + 1721126070 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc0d94b0-435e-11ef-9e66-fd84d5bf3736 + + + diff --git a/graph/incidents_graphml/f/fc0e35d0-752a-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/f/fc0e35d0-752a-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4fc230fc055f14df836e4d164ad5b8833289884 --- /dev/null +++ b/graph/incidents_graphml/f/fc0e35d0-752a-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.138 + 100.64.21.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698453797 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc0e35d0-752a-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/f/fc114050-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fc114050-4d9c-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3faba9f8a070a641462efcc11648de6483212233 --- /dev/null +++ b/graph/incidents_graphml/f/fc114050-4d9c-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.207 + 100.64.14.207 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694104713 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc114050-4d9c-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/f/fc14c460-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fc14c460-12a4-11ee-ab1f-2bdb6669e8cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb6a982d0edff97f6dc89943e67fe188fd6dc270 --- /dev/null +++ b/graph/incidents_graphml/f/fc14c460-12a4-11ee-ab1f-2bdb6669e8cc.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.179 + 100.64.33.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687621031 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc14c460-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc14c460-12a4-11ee-ab1f-2bdb6669e8cc + + + diff --git a/graph/incidents_graphml/f/fc152390-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fc152390-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3feb1a808982497fac18a6c2e897d1ce3e2a07ae --- /dev/null +++ b/graph/incidents_graphml/f/fc152390-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.120 + 100.64.55.120 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093678 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc152390-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/f/fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3d89754a77c3fe1b754be5a9f38629a79bbe1a8 --- /dev/null +++ b/graph/incidents_graphml/f/fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.138 + 100.64.21.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698453797 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc1cdbd0-752a-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/f/fc1efc80-ffeb-11ed-97eb-05d23f72b81e.graphml b/graph/incidents_graphml/f/fc1efc80-ffeb-11ed-97eb-05d23f72b81e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8045a54590e450a2ccb255639e68ae36d6c0de64 --- /dev/null +++ b/graph/incidents_graphml/f/fc1efc80-ffeb-11ed-97eb-05d23f72b81e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.37.131 + 100.64.37.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685562453 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc1efc80-ffeb-11ed-97eb-05d23f72b81e + + + diff --git a/graph/incidents_graphml/f/fc203880-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fc203880-0b1a-11ef-9e64-a71223ce0876.graphml new file mode 100644 index 0000000000000000000000000000000000000000..532a99741eb2264f8d0ce618f4ac4f67daf833ef --- /dev/null +++ b/graph/incidents_graphml/f/fc203880-0b1a-11ef-9e64-a71223ce0876.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.248 + USER-0015-1255.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + USER-0015-1999.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1714939599 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc203880-0b1a-11ef-9e64-a71223ce0876 + + + diff --git a/graph/incidents_graphml/f/fc20cdb0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc20cdb0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9531112ebc51a85815bd2e11f0b6b34b55e0b8b4 --- /dev/null +++ b/graph/incidents_graphml/f/fc20cdb0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc20cdb0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fc2b81d0-752a-11ee-97b8-bd3e826c3a7b.graphml b/graph/incidents_graphml/f/fc2b81d0-752a-11ee-97b8-bd3e826c3a7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b86864e0000584db4fcf5fb60707df38098f0f2 --- /dev/null +++ b/graph/incidents_graphml/f/fc2b81d0-752a-11ee-97b8-bd3e826c3a7b.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.140 + 100.64.21.140 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.141 + 100.64.21.141 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.142 + 100.64.21.142 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.143 + 100.64.21.143 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.144 + 100.64.21.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.128 + 100.64.15.128 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.165 + 100.64.10.165 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.145 + 100.64.21.145 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.13 + 100.64.11.13 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.146 + 100.64.21.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.147 + 100.64.21.147 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.148 + 100.64.21.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.149 + 100.64.21.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.150 + 100.64.21.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.151 + 100.64.21.151 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.152 + 100.64.21.152 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.153 + 100.64.21.153 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.154 + 100.64.21.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.155 + 100.64.21.155 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + INCIDENT_LINK + 1698453797 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc2b81d0-752a-11ee-97b8-bd3e826c3a7b + + + diff --git a/graph/incidents_graphml/f/fc2e44b0-4522-11ef-b505-f5f313488713.graphml b/graph/incidents_graphml/f/fc2e44b0-4522-11ef-b505-f5f313488713.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e53dee471ad291b4c0a940d48ba90e2709867e20 --- /dev/null +++ b/graph/incidents_graphml/f/fc2e44b0-4522-11ef-b505-f5f313488713.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + USER-0015-1979.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.16 + USER-0015-2026.example.internal + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.46.208 + USER-0015-1982.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1721320203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc2e44b0-4522-11ef-b505-f5f313488713 + + + INCIDENT_LINK + 1721320203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc2e44b0-4522-11ef-b505-f5f313488713 + + + INCIDENT_LINK + 1721320203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc2e44b0-4522-11ef-b505-f5f313488713 + + + INCIDENT_LINK + 1721320203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc2e44b0-4522-11ef-b505-f5f313488713 + + + diff --git a/graph/incidents_graphml/f/fc2f7700-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/fc2f7700-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d68320b8632245cac168eeccb29cb4da57da6b0 --- /dev/null +++ b/graph/incidents_graphml/f/fc2f7700-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.39 + 100.64.23.39 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368161 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc2f7700-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/f/fc320bc0-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc320bc0-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d497711517de95b2fa73b392e5fb4934d096e49 --- /dev/null +++ b/graph/incidents_graphml/f/fc320bc0-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.36 + 100.64.30.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924193 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc320bc0-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fc336900-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc336900-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c99cf3b1bcdbf4b39663c2bf42ddc06f7e5db13 --- /dev/null +++ b/graph/incidents_graphml/f/fc336900-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.10 + 100.64.94.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc336900-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc3ab560-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/fc3ab560-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28d27695c79960192baf69cbfe056bd685eba143 --- /dev/null +++ b/graph/incidents_graphml/f/fc3ab560-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.182 + 100.64.7.182 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc3ab560-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45fe99545bc79424ffcb227b94f192f03894085a --- /dev/null +++ b/graph/incidents_graphml/f/fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.65 + 100.64.21.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.149 + 100.64.71.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687621031 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc3b1110-12a4-11ee-ab1f-2bdb6669e8cc + + + diff --git a/graph/incidents_graphml/f/fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6a831a10fc33edb75e76bfd2624f4dbb7a3d3d8 --- /dev/null +++ b/graph/incidents_graphml/f/fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.10 + 100.64.94.10 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660457939 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc3c1b90-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc3fa050-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc3fa050-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0ce4063c12b463dff10a7295f7d29f90bb53062 --- /dev/null +++ b/graph/incidents_graphml/f/fc3fa050-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.23 + 100.64.2.23 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924193 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc3fa050-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fc3fa3a0-6232-11ee-a972-e59ec7ee05b9.graphml b/graph/incidents_graphml/f/fc3fa3a0-6232-11ee-a972-e59ec7ee05b9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbb98867619a91a6adb79b05200c19d356cfcd52 --- /dev/null +++ b/graph/incidents_graphml/f/fc3fa3a0-6232-11ee-a972-e59ec7ee05b9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.39 + 100.64.23.39 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696368161 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc3fa3a0-6232-11ee-a972-e59ec7ee05b9 + + + diff --git a/graph/incidents_graphml/f/fc462db0-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc462db0-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b9f6f267e38d8c6a60a645e4d0a39cdffb066e0 --- /dev/null +++ b/graph/incidents_graphml/f/fc462db0-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,173 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.14 + 100.64.94.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc462db0-1b98-11ed-a54c-ef9c6482c8d3 + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc462db0-1b98-11ed-a54c-ef9c6482c8d3 + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc462db0-1b98-11ed-a54c-ef9c6482c8d3 + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc462db0-1b98-11ed-a54c-ef9c6482c8d3 + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc462db0-1b98-11ed-a54c-ef9c6482c8d3 + + + INCIDENT_LINK + 1660457939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc462db0-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc49a980-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/fc49a980-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cdc89993b55b0d6c845bd5dbce85ad584161bf4b --- /dev/null +++ b/graph/incidents_graphml/f/fc49a980-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.182 + 100.64.7.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882532 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc49a980-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f218c5dc66afe5bb89c9c5e4787a7c3ec035dc9 --- /dev/null +++ b/graph/incidents_graphml/f/fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.14 + 100.64.94.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660457940 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc4b5dd0-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc4f5570-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc4f5570-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..734d52b7e426824dc8344fd1f15b23c99a86cc6d --- /dev/null +++ b/graph/incidents_graphml/f/fc4f5570-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.250 + 100.64.23.250 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660457940 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc4f5570-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc51abf0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc51abf0-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38807de99bdf59fea0012952be2572323235df48 --- /dev/null +++ b/graph/incidents_graphml/f/fc51abf0-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.238 + 100.64.22.238 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc51abf0-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e.graphml b/graph/incidents_graphml/f/fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db9e7b0133de6423eb09201ab01a128d4806cae9 --- /dev/null +++ b/graph/incidents_graphml/f/fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.58 + 100.64.82.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690573391 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc5481f0-2d7e-11ee-b431-c96f4a8a8f7e + + + diff --git a/graph/incidents_graphml/f/fc55d270-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc55d270-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3fea4c99098250f3e97f755b0dd49500ee8a267e --- /dev/null +++ b/graph/incidents_graphml/f/fc55d270-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.9 + 100.64.33.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465858 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc55d270-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/fc580800-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc580800-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..552a5083636df2252ef9f08f8a77d9b77abfd021 --- /dev/null +++ b/graph/incidents_graphml/f/fc580800-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.23.250 + 100.64.23.250 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660457940 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc580800-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc581160-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fc581160-0b1a-11ef-9e64-a71223ce0876.graphml new file mode 100644 index 0000000000000000000000000000000000000000..630eaa4d9e4d3b30da25cfc395bfcdf6fa1d1a59 --- /dev/null +++ b/graph/incidents_graphml/f/fc581160-0b1a-11ef-9e64-a71223ce0876.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.15.1 + 100.64.15.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714939600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc581160-0b1a-11ef-9e64-a71223ce0876 + + + diff --git a/graph/incidents_graphml/f/fc599e40-5ce2-11ee-888f-c5a21ae2b888.graphml b/graph/incidents_graphml/f/fc599e40-5ce2-11ee-888f-c5a21ae2b888.graphml new file mode 100644 index 0000000000000000000000000000000000000000..557ca6bd204f01b4ae493e191e099baba2f1aec7 --- /dev/null +++ b/graph/incidents_graphml/f/fc599e40-5ce2-11ee-888f-c5a21ae2b888.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.81 + 100.64.33.81 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.81 + 100.64.44.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.82 + 100.64.44.82 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695784046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc599e40-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc599e40-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc599e40-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc599e40-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc599e40-5ce2-11ee-888f-c5a21ae2b888 + + + INCIDENT_LINK + 1695784046 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc599e40-5ce2-11ee-888f-c5a21ae2b888 + + + diff --git a/graph/incidents_graphml/f/fc5cc540-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc5cc540-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91b5bb82be664eeec8ee27b246799f2af2e104d6 --- /dev/null +++ b/graph/incidents_graphml/f/fc5cc540-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.97 + 100.64.56.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc5cc540-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fc5d3820-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc5d3820-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..374b697fb711202046af6ee0008aa02a4e7ab2c3 --- /dev/null +++ b/graph/incidents_graphml/f/fc5d3820-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.31 + 100.64.91.31 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660457940 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc5d3820-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc631110-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc631110-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6f6b23c97f76ecd3ff4fdf0fe6d573bc1d43838 --- /dev/null +++ b/graph/incidents_graphml/f/fc631110-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.238 + 100.64.22.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc631110-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc.graphml b/graph/incidents_graphml/f/fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ee433536377da54d3a387bf2a234c3570baf664 --- /dev/null +++ b/graph/incidents_graphml/f/fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.40 + 100.64.79.40 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.38 + 100.64.73.38 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.41 + 100.64.79.41 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.79.42 + 100.64.79.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687621031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc + + + INCIDENT_LINK + 1687621031 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc6380a0-12a4-11ee-ab1f-2bdb6669e8cc + + + diff --git a/graph/incidents_graphml/f/fc6821f0-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc6821f0-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0492293e93526d2cc6d1cf785e533669713c516d --- /dev/null +++ b/graph/incidents_graphml/f/fc6821f0-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.9 + 100.64.33.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465858 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc6821f0-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/fc6834a0-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fc6834a0-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20497e6715f0c7f41c08ccf3cc40065a7e3ee900 --- /dev/null +++ b/graph/incidents_graphml/f/fc6834a0-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.91.31 + 100.64.91.31 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660457940 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc6834a0-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fc6bb960-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fc6bb960-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f6de19c64c174bd2c697dffdc56a139c88cbd979 --- /dev/null +++ b/graph/incidents_graphml/f/fc6bb960-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.97 + 100.64.56.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc6bb960-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fc70c8d0-4401-11ee-b97c-f959f41b9d07.graphml b/graph/incidents_graphml/f/fc70c8d0-4401-11ee-b97c-f959f41b9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d4638d411ca137bfef8c1787e2e1b1df37580cc --- /dev/null +++ b/graph/incidents_graphml/f/fc70c8d0-4401-11ee-b97c-f959f41b9d07.graphml @@ -0,0 +1,365 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.216 + 100.64.20.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.239 + 100.64.62.239 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.240 + 100.64.62.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.195 + 100.64.6.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.241 + 100.64.62.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.247 + 100.64.60.247 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.221 + 100.64.14.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + INCIDENT_LINK + 1693048581 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc70c8d0-4401-11ee-b97c-f959f41b9d07 + + + diff --git a/graph/incidents_graphml/f/fc70f3c0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc70f3c0-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..277e3d9fd52dfa65c6de5a70ec2489298db7b58e --- /dev/null +++ b/graph/incidents_graphml/f/fc70f3c0-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.242 + 100.64.22.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc70f3c0-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fc77b250-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc77b250-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8b0f8c499f50fdf04d0d09cce759774f7dd11e7 --- /dev/null +++ b/graph/incidents_graphml/f/fc77b250-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.11 + 100.64.33.11 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465858 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc77b250-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/fc7fe7e0-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc7fe7e0-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0cd4e3a51af6fd1578646a6287eb26d1f9abb81 --- /dev/null +++ b/graph/incidents_graphml/f/fc7fe7e0-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.242 + 100.64.22.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc7fe7e0-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fc8a9e10-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fc8a9e10-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc830ff987cd95effbff62d82a2846635a112924 --- /dev/null +++ b/graph/incidents_graphml/f/fc8a9e10-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.11 + 100.64.33.11 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465858 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc8a9e10-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/fc8dca90-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc8dca90-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f69459afb1b00da3fa3316f10ed9608f4d889d7 --- /dev/null +++ b/graph/incidents_graphml/f/fc8dca90-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fc8dca90-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fc911870-f3cf-11ec-b969-4736ca05d771.graphml b/graph/incidents_graphml/f/fc911870-f3cf-11ec-b969-4736ca05d771.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30bfdeb4e0a4f396ad240328a597c170b4683800 --- /dev/null +++ b/graph/incidents_graphml/f/fc911870-f3cf-11ec-b969-4736ca05d771.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.226 + USER-0015-1606.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656083516 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc911870-f3cf-11ec-b969-4736ca05d771 + + + diff --git a/graph/incidents_graphml/f/fc91ebb0-66fb-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/f/fc91ebb0-66fb-11ee-869c-79758109a47c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23be468b38e140b6e2ed5a994f4661128d977dfe --- /dev/null +++ b/graph/incidents_graphml/f/fc91ebb0-66fb-11ee-869c-79758109a47c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.119 + 100.64.50.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696894295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc91ebb0-66fb-11ee-869c-79758109a47c + + + diff --git a/graph/incidents_graphml/f/fc944be0-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fc944be0-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f1bb4e1ab05c5d92f856c589e7fd70f3e6df62e --- /dev/null +++ b/graph/incidents_graphml/f/fc944be0-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801662 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc944be0-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fc969cf0-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fc969cf0-4d9c-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8050c53010b6ee376a16f519bdb1702a78568004 --- /dev/null +++ b/graph/incidents_graphml/f/fc969cf0-4d9c-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.90 + 100.64.59.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694104714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc969cf0-4d9c-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/f/fc99f840-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fc99f840-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66b14a293775a5a6c2b4b4ac041fea005cd9cb1a --- /dev/null +++ b/graph/incidents_graphml/f/fc99f840-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.99 + 100.64.39.99 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920460 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fc99f840-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fc9e6c60-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fc9e6c60-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..783691de7084aac74cc6da796aad09a8058e5472 --- /dev/null +++ b/graph/incidents_graphml/f/fc9e6c60-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.124 + 100.64.10.124 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc9e6c60-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fc9f0b10-66fb-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/f/fc9f0b10-66fb-11ee-869c-79758109a47c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dd6066cedd3374dc42b1dbaed85860d73875b741 --- /dev/null +++ b/graph/incidents_graphml/f/fc9f0b10-66fb-11ee-869c-79758109a47c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.50.119 + 100.64.50.119 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1696894295 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fc9f0b10-66fb-11ee-869c-79758109a47c + + + diff --git a/graph/incidents_graphml/f/fc9f3f90-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fc9f3f90-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71618efceb9c88cbe736b9d2314129135a28ced1 --- /dev/null +++ b/graph/incidents_graphml/f/fc9f3f90-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.43 + 100.64.34.43 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753947 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc9f3f90-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fc9fa1b0-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fc9fa1b0-0b1a-11ef-9e64-a71223ce0876.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a77be12ff74667db9729a65149899ed50a18ed2 --- /dev/null +++ b/graph/incidents_graphml/f/fc9fa1b0-0b1a-11ef-9e64-a71223ce0876.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.193 + 100.64.45.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1714939600 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fc9fa1b0-0b1a-11ef-9e64-a71223ce0876 + + + diff --git a/graph/incidents_graphml/f/fca93370-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fca93370-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bef1eb59aab12b34ee3ab2b3fb6404c7e378e8ab --- /dev/null +++ b/graph/incidents_graphml/f/fca93370-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.106 + 100.64.20.106 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fca93370-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fca93a80-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fca93a80-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18014a2da49de68db249fd8a21a8e50794fdf8ac --- /dev/null +++ b/graph/incidents_graphml/f/fca93a80-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.99 + 100.64.39.99 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920460 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fca93a80-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fcaac130-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fcaac130-4d9c-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a20f6742d3afd350b4f03cea6599e91fb95be73a --- /dev/null +++ b/graph/incidents_graphml/f/fcaac130-4d9c-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.92 + 100.64.59.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694104714 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcaac130-4d9c-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/f/fcabd1b0-4f54-11ee-a8d7-55254673f433.graphml b/graph/incidents_graphml/f/fcabd1b0-4f54-11ee-a8d7-55254673f433.graphml new file mode 100644 index 0000000000000000000000000000000000000000..701099cbfd2c5d94a30121ab565a2b45e9115592 --- /dev/null +++ b/graph/incidents_graphml/f/fcabd1b0-4f54-11ee-a8d7-55254673f433.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.172 + 100.64.45.172 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694293693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcabd1b0-4f54-11ee-a8d7-55254673f433 + + + diff --git a/graph/incidents_graphml/f/fcad8790-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fcad8790-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eadd94bbcb646b5fbb369286e7dc6651e05ea30c --- /dev/null +++ b/graph/incidents_graphml/f/fcad8790-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.244 + 100.64.22.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcad8790-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8.graphml b/graph/incidents_graphml/f/fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..856d6d0192515a58aedd277c2fac5d00f1969992 --- /dev/null +++ b/graph/incidents_graphml/f/fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.43 + 100.64.34.43 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692753947 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fcb0a4b0-4153-11ee-b2c3-cd25671e6ae8 + + + diff --git a/graph/incidents_graphml/f/fcb2b480-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fcb2b480-0b1a-11ef-9e64-a71223ce0876.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48d8575ba39f297bf6eb21c2e2c26a4503817274 --- /dev/null +++ b/graph/incidents_graphml/f/fcb2b480-0b1a-11ef-9e64-a71223ce0876.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.45.193 + 100.64.45.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1714939600 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fcb2b480-0b1a-11ef-9e64-a71223ce0876 + + + diff --git a/graph/incidents_graphml/f/fcb92100-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fcb92100-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9a91260f2e549ea5a5ce6e0661082d15384672e --- /dev/null +++ b/graph/incidents_graphml/f/fcb92100-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.177 + 100.64.16.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fcb92100-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fcbc4d60-4d9c-11ee-b83a-49677896a1e8.graphml b/graph/incidents_graphml/f/fcbc4d60-4d9c-11ee-b83a-49677896a1e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d038535969aa8807e80f2aa9829119c03c097a96 --- /dev/null +++ b/graph/incidents_graphml/f/fcbc4d60-4d9c-11ee-b83a-49677896a1e8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.92 + 100.64.59.92 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694104714 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fcbc4d60-4d9c-11ee-b83a-49677896a1e8 + + + diff --git a/graph/incidents_graphml/f/fcc5f190-14e2-11ef-be13-69fb87490927.graphml b/graph/incidents_graphml/f/fcc5f190-14e2-11ef-be13-69fb87490927.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58096e45b2d1b006f1fd2e61705df53e5fe304f1 --- /dev/null +++ b/graph/incidents_graphml/f/fcc5f190-14e2-11ef-be13-69fb87490927.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.244 + 100.64.22.244 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716015060 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fcc5f190-14e2-11ef-be13-69fb87490927 + + + diff --git a/graph/incidents_graphml/f/fccd6c50-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fccd6c50-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19e8a1265449e8c16ee3a23f86a8f9bcb49b11df --- /dev/null +++ b/graph/incidents_graphml/f/fccd6c50-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.179 + 100.64.16.179 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fccd6c50-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fccdffb0-4f54-11ee-a8d7-55254673f433.graphml b/graph/incidents_graphml/f/fccdffb0-4f54-11ee-a8d7-55254673f433.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94f38ee4fcef7c704ccc5ab1c30ba2f76bc99e8e --- /dev/null +++ b/graph/incidents_graphml/f/fccdffb0-4f54-11ee-a8d7-55254673f433.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.205 + 100.64.45.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694293693 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fccdffb0-4f54-11ee-a8d7-55254673f433 + + + diff --git a/graph/incidents_graphml/f/fcd034f0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fcd034f0-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cff39873cf0106e8b4c3f0b918c06be73942e88c --- /dev/null +++ b/graph/incidents_graphml/f/fcd034f0-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.134 + 100.64.49.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcd034f0-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fcd1e3e0-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fcd1e3e0-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..337ee78a10a804a6e001af74c659768bfcbcd2db --- /dev/null +++ b/graph/incidents_graphml/f/fcd1e3e0-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.122 + USER-0015-1412.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093679 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcd1e3e0-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fcd5c6d0-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/fcd5c6d0-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a60a8a0dd730d96b5a5c516bf123d75d04f3473 --- /dev/null +++ b/graph/incidents_graphml/f/fcd5c6d0-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.91.18 + 100.64.91.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1675055246 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcd5c6d0-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/fcde3530-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fcde3530-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27893e685697298e7b5c4178784d11415ffcc1f5 --- /dev/null +++ b/graph/incidents_graphml/f/fcde3530-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.181 + 100.64.16.181 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fcde3530-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fcde8cd0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fcde8cd0-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24203455274ec2c7f1cefac19d9706163eb5b359 --- /dev/null +++ b/graph/incidents_graphml/f/fcde8cd0-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.134 + 100.64.49.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fcde8cd0-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fce06630-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/fce06630-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25afaef87567609666ade6c87d91217e618739ae --- /dev/null +++ b/graph/incidents_graphml/f/fce06630-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,605 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.201 + 100.64.37.201 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.202 + 100.64.37.202 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.86 + 100.64.15.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.95 + 100.64.23.95 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.152 + 100.64.22.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.203 + 100.64.37.203 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.204 + 100.64.37.204 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.54 + 100.64.26.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.241 + 100.64.2.241 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.138 + 100.64.20.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.205 + 100.64.37.205 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.160 + 100.64.27.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.206 + 100.64.37.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + INCIDENT_LINK + 1718075786 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce06630-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/fce19b50-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fce19b50-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f34a19ea1769cbe5245af1510b4724c2bad5f17d --- /dev/null +++ b/graph/incidents_graphml/f/fce19b50-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.122 + USER-0015-1412.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093679 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fce19b50-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fce1fbd0-a05b-11ed-9aec-656149dc5369.graphml b/graph/incidents_graphml/f/fce1fbd0-a05b-11ed-9aec-656149dc5369.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c5b3844745548d25c48859c8e37a60a6525fb7f7 --- /dev/null +++ b/graph/incidents_graphml/f/fce1fbd0-a05b-11ed-9aec-656149dc5369.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.84.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.18 + 100.64.91.18 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675055246 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fce1fbd0-a05b-11ed-9aec-656149dc5369 + + + diff --git a/graph/incidents_graphml/f/fce22aa0-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fce22aa0-68d4-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a05b8318211de5fd3a63bdacbc4398803340cd1f --- /dev/null +++ b/graph/incidents_graphml/f/fce22aa0-68d4-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.54 + 100.64.41.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697097448 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fce22aa0-68d4-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/f/fceb0ff0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fceb0ff0-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4d556f2e038ecf018d0fdd2d4e719de336b0605 --- /dev/null +++ b/graph/incidents_graphml/f/fceb0ff0-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.248 + 100.64.33.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fceb0ff0-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fceefe10-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fceefe10-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2b248cb05cefe3af9ea061064ba1f7dc5628c94b --- /dev/null +++ b/graph/incidents_graphml/f/fceefe10-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.185 + 100.64.16.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fceefe10-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fcf23030-68d4-11ee-bfd3-8f3b77e847d5.graphml b/graph/incidents_graphml/f/fcf23030-68d4-11ee-bfd3-8f3b77e847d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0de02e23b4b6b37acd0a0945ebf172c0cd34da9 --- /dev/null +++ b/graph/incidents_graphml/f/fcf23030-68d4-11ee-bfd3-8f3b77e847d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.54 + 100.64.41.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697097448 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fcf23030-68d4-11ee-bfd3-8f3b77e847d5 + + + diff --git a/graph/incidents_graphml/f/fcf303d0-27a0-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/f/fcf303d0-27a0-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..316e11e1d2b87d71cad0208785f3060840fe849d --- /dev/null +++ b/graph/incidents_graphml/f/fcf303d0-27a0-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718075786 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fcf303d0-27a0-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/f/fcfa7940-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fcfa7940-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4de10fee743385f5e67800a03d873e261a702afb --- /dev/null +++ b/graph/incidents_graphml/f/fcfa7940-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.248 + 100.64.33.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488193 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fcfa7940-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fcfbcef0-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/f/fcfbcef0-10b5-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6ee16ccc126bc9881047e3fe14419529c90c876 --- /dev/null +++ b/graph/incidents_graphml/f/fcfbcef0-10b5-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.62 + 100.64.68.62 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + INCIDENT_LINK + 1687408431 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fcfbcef0-10b5-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/f/fcfdf230-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fcfdf230-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2bba9ae499ebdfc2596fa4616297fd6612863d5a --- /dev/null +++ b/graph/incidents_graphml/f/fcfdf230-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.182 + 100.64.16.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcfdf230-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..74ce38283617bf5df18fca909a942b50d2763b99 --- /dev/null +++ b/graph/incidents_graphml/f/fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8 + + + INCIDENT_LINK + 1708801663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fcff90d0-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fd065640-10b5-11ee-aed8-b565505929b5.graphml b/graph/incidents_graphml/f/fd065640-10b5-11ee-aed8-b565505929b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49e056b085057bf7b9d7547765e40bab9f122003 --- /dev/null +++ b/graph/incidents_graphml/f/fd065640-10b5-11ee-aed8-b565505929b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.62 + 100.64.68.62 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1687408431 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd065640-10b5-11ee-aed8-b565505929b5 + + + diff --git a/graph/incidents_graphml/f/fd076b60-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd076b60-368b-11ee-b839-f5eaf8816d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..361ec974ff7572cb4bd2b48b5d0ef082f7bf51cc --- /dev/null +++ b/graph/incidents_graphml/f/fd076b60-368b-11ee-b839-f5eaf8816d24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.229 + 100.64.28.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691568537 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd076b60-368b-11ee-b839-f5eaf8816d24 + + + diff --git a/graph/incidents_graphml/f/fd0a30b0-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fd0a30b0-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..236b689d683ed8927084322fa0364deebda20273 --- /dev/null +++ b/graph/incidents_graphml/f/fd0a30b0-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.136 + 100.64.49.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd0a30b0-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fd0c00f0-a826-11ee-a66a-73cdfe320442.graphml b/graph/incidents_graphml/f/fd0c00f0-a826-11ee-a66a-73cdfe320442.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cbb40e6ad828212a9c03d63ef3e9c00d5b33c39 --- /dev/null +++ b/graph/incidents_graphml/f/fd0c00f0-a826-11ee-a66a-73cdfe320442.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.29 + 100.64.38.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704059590 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd0c00f0-a826-11ee-a66a-73cdfe320442 + + + diff --git a/graph/incidents_graphml/f/fd0ce650-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd0ce650-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cedeae15a62a32cc6443ada3f66f1f9126f3d13c --- /dev/null +++ b/graph/incidents_graphml/f/fd0ce650-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.182 + 100.64.16.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd0ce650-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fd0d3080-594c-11ed-aecd-b7c09b1a67fb.graphml b/graph/incidents_graphml/f/fd0d3080-594c-11ed-aecd-b7c09b1a67fb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..096d397fca8baa5e44f1cdbc7562a94d4e152152 --- /dev/null +++ b/graph/incidents_graphml/f/fd0d3080-594c-11ed-aecd-b7c09b1a67fb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.118 + 100.64.71.118 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.119 + 100.64.71.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667242271 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd0d3080-594c-11ed-aecd-b7c09b1a67fb + + + INCIDENT_LINK + 1667242271 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd0d3080-594c-11ed-aecd-b7c09b1a67fb + + + diff --git a/graph/incidents_graphml/f/fd0e3fb0-0eab-11ee-a4b1-aff62beab862.graphml b/graph/incidents_graphml/f/fd0e3fb0-0eab-11ee-a4b1-aff62beab862.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15e98ba011c30339baa3afe9ed3bb60e034fe147 --- /dev/null +++ b/graph/incidents_graphml/f/fd0e3fb0-0eab-11ee-a4b1-aff62beab862.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.162 + 100.64.46.162 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687184234 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd0e3fb0-0eab-11ee-a4b1-aff62beab862 + + + diff --git a/graph/incidents_graphml/f/fd125d10-23a1-11ee-b3c4-1b81ee59f0d7.graphml b/graph/incidents_graphml/f/fd125d10-23a1-11ee-b3c4-1b81ee59f0d7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8fe285dffd676f85c0e537a8fe4d7f5b50dc2e2 --- /dev/null +++ b/graph/incidents_graphml/f/fd125d10-23a1-11ee-b3c4-1b81ee59f0d7.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.83 + 100.64.29.83 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1689488913 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd125d10-23a1-11ee-b3c4-1b81ee59f0d7 + + + INCIDENT_LINK + 1689488913 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd125d10-23a1-11ee-b3c4-1b81ee59f0d7 + + + diff --git a/graph/incidents_graphml/f/fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8.graphml b/graph/incidents_graphml/f/fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68b5011b027276f348e538bceb22159cab7f233e --- /dev/null +++ b/graph/incidents_graphml/f/fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.242 + 100.64.8.242 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708801663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd13dc20-d347-11ee-9f4f-e3f2e08e6ef8 + + + diff --git a/graph/incidents_graphml/f/fd199a00-90c3-11ee-80a7-fbabb114d7cd.graphml b/graph/incidents_graphml/f/fd199a00-90c3-11ee-80a7-fbabb114d7cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cb62cf098285bd9d4d1e0ba9af09fa2d77cc9af --- /dev/null +++ b/graph/incidents_graphml/f/fd199a00-90c3-11ee-80a7-fbabb114d7cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.136 + 100.64.49.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701488193 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd199a00-90c3-11ee-80a7-fbabb114d7cd + + + diff --git a/graph/incidents_graphml/f/fd1c2090-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd1c2090-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6f29c41cd5ada622891bf3297c781971612e1d0e --- /dev/null +++ b/graph/incidents_graphml/f/fd1c2090-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.6 + 100.64.23.6 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920461 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd1c2090-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fd1cc060-0570-11ee-bce7-dffdb32a6ba9.graphml b/graph/incidents_graphml/f/fd1cc060-0570-11ee-bce7-dffdb32a6ba9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18fec8cfc566870e24a07a27cab94ebc467c447c --- /dev/null +++ b/graph/incidents_graphml/f/fd1cc060-0570-11ee-bce7-dffdb32a6ba9.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.56 + 100.64.75.56 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.3 + 100.64.72.3 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.72.215 + 100.64.72.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1686169333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd1cc060-0570-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686169333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd1cc060-0570-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686169333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd1cc060-0570-11ee-bce7-dffdb32a6ba9 + + + INCIDENT_LINK + 1686169333 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd1cc060-0570-11ee-bce7-dffdb32a6ba9 + + + diff --git a/graph/incidents_graphml/f/fd286a80-66a7-11ee-8819-db4d49a98ea0.graphml b/graph/incidents_graphml/f/fd286a80-66a7-11ee-8819-db4d49a98ea0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7b339fcc177fef7c3b4828ed10647d2d702b4c3 --- /dev/null +++ b/graph/incidents_graphml/f/fd286a80-66a7-11ee-8819-db4d49a98ea0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.62.165 + USER-0015-1449.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696858218 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd286a80-66a7-11ee-8819-db4d49a98ea0 + + + diff --git a/graph/incidents_graphml/f/fd29e780-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd29e780-368b-11ee-b839-f5eaf8816d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44e790de309164dd7ebcf1f25501aaf7aa104dd9 --- /dev/null +++ b/graph/incidents_graphml/f/fd29e780-368b-11ee-b839-f5eaf8816d24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.229 + 100.64.28.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691568537 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd29e780-368b-11ee-b839-f5eaf8816d24 + + + diff --git a/graph/incidents_graphml/f/fd2a0760-0b1a-11ef-9e64-a71223ce0876.graphml b/graph/incidents_graphml/f/fd2a0760-0b1a-11ef-9e64-a71223ce0876.graphml new file mode 100644 index 0000000000000000000000000000000000000000..625cdc93821f822c801a96a04d448843e0f57207 --- /dev/null +++ b/graph/incidents_graphml/f/fd2a0760-0b1a-11ef-9e64-a71223ce0876.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.245.248 + 172.22.245.248 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.194 + 100.64.87.194 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714939601 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd2a0760-0b1a-11ef-9e64-a71223ce0876 + + + diff --git a/graph/incidents_graphml/f/fd2dacc0-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd2dacc0-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93b83f0d90c6eed1c760df733a9224973e9ba248 --- /dev/null +++ b/graph/incidents_graphml/f/fd2dacc0-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.6 + 100.64.23.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920461 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd2dacc0-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fd2f2d30-2bf6-11ed-8886-957cd06d5e69.graphml b/graph/incidents_graphml/f/fd2f2d30-2bf6-11ed-8886-957cd06d5e69.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ca298c4955da29968582a807ff1e2648f47568a --- /dev/null +++ b/graph/incidents_graphml/f/fd2f2d30-2bf6-11ed-8886-957cd06d5e69.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.245 + 100.64.39.245 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.63 + USER-0015-1731.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1662257532 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd2f2d30-2bf6-11ed-8886-957cd06d5e69 + + + diff --git a/graph/incidents_graphml/f/fd399800-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fd399800-1657-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c0d619179d8f8d7f29679b8a37ec5be92012d36 --- /dev/null +++ b/graph/incidents_graphml/f/fd399800-1657-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688027766 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd399800-1657-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/f/fd3a7b10-5510-11ee-acde-a35f456e55de.graphml b/graph/incidents_graphml/f/fd3a7b10-5510-11ee-acde-a35f456e55de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d70bae2dfbdecf952b7c5da3f2c6aad5645d2745 --- /dev/null +++ b/graph/incidents_graphml/f/fd3a7b10-5510-11ee-acde-a35f456e55de.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.243 + 100.64.13.243 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694924195 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd3a7b10-5510-11ee-acde-a35f456e55de + + + diff --git a/graph/incidents_graphml/f/fd3d6430-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd3d6430-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8bb77f645738b1f3a9621b7017b6551d78b38c6f --- /dev/null +++ b/graph/incidents_graphml/f/fd3d6430-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.217 + 100.64.27.217 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920461 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd3d6430-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fd400b60-908f-11ee-8556-17eb2ccba952.graphml b/graph/incidents_graphml/f/fd400b60-908f-11ee-8556-17eb2ccba952.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad48b8ab830ee46e4203ff48fe1180e19d5bf2ee --- /dev/null +++ b/graph/incidents_graphml/f/fd400b60-908f-11ee-8556-17eb2ccba952.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.187 + 100.64.7.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701465859 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd400b60-908f-11ee-8556-17eb2ccba952 + + + diff --git a/graph/incidents_graphml/f/fd45d0a0-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd45d0a0-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..394728889eef847efc41fbbac6ac20dacb75ffb4 --- /dev/null +++ b/graph/incidents_graphml/f/fd45d0a0-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.187 + 100.64.16.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd45d0a0-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fd4ec950-4bef-11ee-94e8-97f877b7b7a5.graphml b/graph/incidents_graphml/f/fd4ec950-4bef-11ee-94e8-97f877b7b7a5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24f61bf9c079320d1ababc3f42e49de8c7e0fbc4 --- /dev/null +++ b/graph/incidents_graphml/f/fd4ec950-4bef-11ee-94e8-97f877b7b7a5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.101 + 100.64.39.101 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693920461 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd4ec950-4bef-11ee-94e8-97f877b7b7a5 + + + diff --git a/graph/incidents_graphml/f/fd4f7c30-d360-11ee-82a4-572767498e98.graphml b/graph/incidents_graphml/f/fd4f7c30-d360-11ee-82a4-572767498e98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c55b79abe743305d9cbecd25d5f31a19c45e1c1d --- /dev/null +++ b/graph/incidents_graphml/f/fd4f7c30-d360-11ee-82a4-572767498e98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.246 + 100.64.8.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708812401 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd4f7c30-d360-11ee-82a4-572767498e98 + + + diff --git a/graph/incidents_graphml/f/fd5476a0-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd5476a0-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..273e7c147cc0460cba2d0eadff751976510dc44f --- /dev/null +++ b/graph/incidents_graphml/f/fd5476a0-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.187 + 100.64.16.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056681 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd5476a0-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fd54a320-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fd54a320-a2ca-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0ea58bea32cdc38fa8f3341daab791de32bca51 --- /dev/null +++ b/graph/incidents_graphml/f/fd54a320-a2ca-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.172 + 100.64.92.172 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703470321 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd54a320-a2ca-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/f/fd598300-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd598300-368b-11ee-b839-f5eaf8816d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe52614ef0746228ee9a30552290521b82958967 --- /dev/null +++ b/graph/incidents_graphml/f/fd598300-368b-11ee-b839-f5eaf8816d24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.62 + 100.64.57.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691568537 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd598300-368b-11ee-b839-f5eaf8816d24 + + + diff --git a/graph/incidents_graphml/f/fd5e10c0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd5e10c0-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9efa440cf1b56791a3a4c2cfc033890ecebc3fe7 --- /dev/null +++ b/graph/incidents_graphml/f/fd5e10c0-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.109 + USER-0015-1195.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355181 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd5e10c0-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/fd6032d0-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fd6032d0-1657-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d7e0849ba846acef12df711f4a8d89a8df04340 --- /dev/null +++ b/graph/incidents_graphml/f/fd6032d0-1657-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688027766 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd6032d0-1657-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/f/fd60c570-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fd60c570-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3346346d576737515b86587dc3674123a2a12a77 --- /dev/null +++ b/graph/incidents_graphml/f/fd60c570-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.44 + 100.64.94.44 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1660457941 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd60c570-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fd656c00-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fd656c00-a2ca-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b0ba339903e3a3d7c6add9d0ea659bf1ae28f99 --- /dev/null +++ b/graph/incidents_graphml/f/fd656c00-a2ca-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.47.61 + 100.64.47.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703470321 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd656c00-a2ca-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/f/fd669f10-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd669f10-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c44436e6b22a2217848bba3a1a56857bdb5e7056 --- /dev/null +++ b/graph/incidents_graphml/f/fd669f10-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.189 + 100.64.16.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd669f10-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fd69c620-1b98-11ed-a54c-ef9c6482c8d3.graphml b/graph/incidents_graphml/f/fd69c620-1b98-11ed-a54c-ef9c6482c8d3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d99f983690693ce8683a522e5a8b82ef04f17737 --- /dev/null +++ b/graph/incidents_graphml/f/fd69c620-1b98-11ed-a54c-ef9c6482c8d3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.44 + 100.64.94.44 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660457941 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd69c620-1b98-11ed-a54c-ef9c6482c8d3 + + + diff --git a/graph/incidents_graphml/f/fd6c2c00-22d4-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/f/fd6c2c00-22d4-11ee-a717-3b672dfcef5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b10f063f23cb2fc900c2fc41895afaf87a33d0c --- /dev/null +++ b/graph/incidents_graphml/f/fd6c2c00-22d4-11ee-a717-3b672dfcef5e.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.100 + 100.64.28.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.101 + 100.64.28.101 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.43 + 100.64.14.43 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.102 + 100.64.28.102 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.103 + 100.64.28.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.104 + 100.64.28.104 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.105 + 100.64.28.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.106 + 100.64.28.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.107 + 100.64.28.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd6c2c00-22d4-11ee-a717-3b672dfcef5e + + + diff --git a/graph/incidents_graphml/f/fd6d5300-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd6d5300-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..784b13612c0cc050305aa4d77e590179cb651ee9 --- /dev/null +++ b/graph/incidents_graphml/f/fd6d5300-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.109 + USER-0015-1195.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355181 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd6d5300-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/fd6e41a0-15b5-11ef-8b2e-b54e20f7e466.graphml b/graph/incidents_graphml/f/fd6e41a0-15b5-11ef-8b2e-b54e20f7e466.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efd68be92d47070ae8b79a7e2135b6dda34bafc5 --- /dev/null +++ b/graph/incidents_graphml/f/fd6e41a0-15b5-11ef-8b2e-b54e20f7e466.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.61.113 + 172.25.61.113 + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.95.106 + 100.64.95.106 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1716105685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd6e41a0-15b5-11ef-8b2e-b54e20f7e466 + + + INCIDENT_LINK + 1716105685 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd6e41a0-15b5-11ef-8b2e-b54e20f7e466 + + + diff --git a/graph/incidents_graphml/f/fd767760-15fe-11ee-b6c1-6f3fa2e3bf20.graphml b/graph/incidents_graphml/f/fd767760-15fe-11ee-b6c1-6f3fa2e3bf20.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e201b08fdb1f57ae8eb91fb7b3688e9984b88a7 --- /dev/null +++ b/graph/incidents_graphml/f/fd767760-15fe-11ee-b6c1-6f3fa2e3bf20.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.101 + USER-0015-1520.example.internal + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1687989541 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd767760-15fe-11ee-b6c1-6f3fa2e3bf20 + + + INCIDENT_LINK + 1687989541 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd767760-15fe-11ee-b6c1-6f3fa2e3bf20 + + + diff --git a/graph/incidents_graphml/f/fd7a9c40-83be-11ee-9aba-5d164a9ceb62.graphml b/graph/incidents_graphml/f/fd7a9c40-83be-11ee-9aba-5d164a9ceb62.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35fcf28bafe309b1db1c0ac4cd8e0386c70a36d3 --- /dev/null +++ b/graph/incidents_graphml/f/fd7a9c40-83be-11ee-9aba-5d164a9ceb62.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.189 + 100.64.16.189 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700056681 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd7a9c40-83be-11ee-9aba-5d164a9ceb62 + + + diff --git a/graph/incidents_graphml/f/fd7b35b0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd7b35b0-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..385cf5d7fa23d26813e636e7b93f5a6ed4f2a26e --- /dev/null +++ b/graph/incidents_graphml/f/fd7b35b0-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355181 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd7b35b0-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/fd7e34e0-2149-11ee-ab17-9db2be59825a.graphml b/graph/incidents_graphml/f/fd7e34e0-2149-11ee-ab17-9db2be59825a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8e3c0fe89c76c9e60c2d9d8a7fcb8b83f4f746d6 --- /dev/null +++ b/graph/incidents_graphml/f/fd7e34e0-2149-11ee-ab17-9db2be59825a.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.221 + 100.64.19.221 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.222 + USER-0015-1219.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.223 + 100.64.19.223 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.187 + 100.64.15.187 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.224 + 100.64.19.224 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.225 + 100.64.19.225 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + INCIDENT_LINK + 1689231216 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd7e34e0-2149-11ee-ab17-9db2be59825a + + + diff --git a/graph/incidents_graphml/f/fd81cda0-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fd81cda0-a2ca-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee44c70199731a226527b2ad3d63ebb64b47df65 --- /dev/null +++ b/graph/incidents_graphml/f/fd81cda0-a2ca-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703470321 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd81cda0-a2ca-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/f/fd837240-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fd837240-1657-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbd15a085b60af348444c7655cba9e7ebc5e25d0 --- /dev/null +++ b/graph/incidents_graphml/f/fd837240-1657-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.237 + 100.64.23.237 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688027766 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd837240-1657-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/f/fd853240-22d4-11ee-a717-3b672dfcef5e.graphml b/graph/incidents_graphml/f/fd853240-22d4-11ee-a717-3b672dfcef5e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34a993a5d13826ddd8a027dcadbc29b7b5324c0f --- /dev/null +++ b/graph/incidents_graphml/f/fd853240-22d4-11ee-a717-3b672dfcef5e.graphml @@ -0,0 +1,711 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.116 + 100.64.28.116 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.117 + 100.64.28.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.118 + 100.64.28.118 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.119 + 100.64.28.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.22 + 100.64.28.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.199 + USER-0015-1270.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.46 + 100.64.28.46 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.120 + 100.64.28.120 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.84 + 100.64.16.84 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.121 + 100.64.28.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.122 + 100.64.28.122 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.123 + 100.64.28.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.124 + 100.64.28.124 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.125 + 100.64.28.125 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.126 + 100.64.28.126 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.127 + USER-0015-1271.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + INCIDENT_LINK + 1689400867 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fd853240-22d4-11ee-a717-3b672dfcef5e + + + diff --git a/graph/incidents_graphml/f/fd861140-368b-11ee-b839-f5eaf8816d24.graphml b/graph/incidents_graphml/f/fd861140-368b-11ee-b839-f5eaf8816d24.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffe9e24a0fdedbd3b11a23c9d4e5e5e798031f42 --- /dev/null +++ b/graph/incidents_graphml/f/fd861140-368b-11ee-b839-f5eaf8816d24.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.62 + 100.64.57.62 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691568537 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd861140-368b-11ee-b839-f5eaf8816d24 + + + diff --git a/graph/incidents_graphml/f/fd89a990-742a-11ee-8022-698b2c645bc2.graphml b/graph/incidents_graphml/f/fd89a990-742a-11ee-8022-698b2c645bc2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21d3ef966bd87d783afcc49407eb21959f624e45 --- /dev/null +++ b/graph/incidents_graphml/f/fd89a990-742a-11ee-8022-698b2c645bc2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.152.54 + 172.21.152.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.89.202 + 100.64.89.202 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698343848 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd89a990-742a-11ee-8022-698b2c645bc2 + + + INCIDENT_LINK + 1698343848 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd89a990-742a-11ee-8022-698b2c645bc2 + + + diff --git a/graph/incidents_graphml/f/fd8a50e0-8675-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/f/fd8a50e0-8675-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..376533d3d13e7dfbe1f0451926bb37fe909450fa --- /dev/null +++ b/graph/incidents_graphml/f/fd8a50e0-8675-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.113 + 100.64.11.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700355181 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd8a50e0-8675-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/f/fd8dfb90-a8bd-11ee-be75-9d7de56126cf.graphml b/graph/incidents_graphml/f/fd8dfb90-a8bd-11ee-be75-9d7de56126cf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c655aafb96eb5d16a38398170ddd6c41a28aedc3 --- /dev/null +++ b/graph/incidents_graphml/f/fd8dfb90-a8bd-11ee-be75-9d7de56126cf.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.195 + 100.64.31.195 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.196 + 100.64.31.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.51 + 100.64.17.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.165 + 100.64.23.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + INCIDENT_LINK + 1704124445 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fd8dfb90-a8bd-11ee-be75-9d7de56126cf + + + diff --git a/graph/incidents_graphml/f/fd943540-9405-11ee-ae31-0b69a6db722c.graphml b/graph/incidents_graphml/f/fd943540-9405-11ee-ae31-0b69a6db722c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a05214c443e98fdba3474d4f94cd79e54421fdf --- /dev/null +++ b/graph/incidents_graphml/f/fd943540-9405-11ee-ae31-0b69a6db722c.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.106 + USER-0015-1230.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.107 + 100.64.21.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.171 + 100.64.19.171 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701846394 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd943540-9405-11ee-ae31-0b69a6db722c + + + INCIDENT_LINK + 1701846394 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd943540-9405-11ee-ae31-0b69a6db722c + + + INCIDENT_LINK + 1701846394 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd943540-9405-11ee-ae31-0b69a6db722c + + + INCIDENT_LINK + 1701846394 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd943540-9405-11ee-ae31-0b69a6db722c + + + INCIDENT_LINK + 1701846394 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd943540-9405-11ee-ae31-0b69a6db722c + + + diff --git a/graph/incidents_graphml/f/fd94dd90-04ca-11ed-ab4e-45e26abbd382.graphml b/graph/incidents_graphml/f/fd94dd90-04ca-11ed-ab4e-45e26abbd382.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be54c01f4f48cdcd457de7a338837ab0cea2d2ff --- /dev/null +++ b/graph/incidents_graphml/f/fd94dd90-04ca-11ed-ab4e-45e26abbd382.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.59 + 100.64.79.59 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.79.60 + 100.64.79.60 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657950540 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd94dd90-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950540 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd94dd90-04ca-11ed-ab4e-45e26abbd382 + + + INCIDENT_LINK + 1657950540 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + fd94dd90-04ca-11ed-ab4e-45e26abbd382 + + + diff --git a/graph/incidents_graphml/f/fd9ba4f0-54af-11ee-b23a-419638593710.graphml b/graph/incidents_graphml/f/fd9ba4f0-54af-11ee-b23a-419638593710.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58e3297ae39ea09f61bb814284997e9856879844 --- /dev/null +++ b/graph/incidents_graphml/f/fd9ba4f0-54af-11ee-b23a-419638593710.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.186 + 100.64.7.186 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.187 + 100.64.7.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.188 + 100.64.7.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.189 + 100.64.7.189 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.190 + 100.64.7.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.191 + 100.64.7.191 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.192 + 100.64.7.192 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.193 + 100.64.7.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.194 + 100.64.7.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.195 + 100.64.7.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.196 + 100.64.7.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.198 + 100.64.7.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.199 + 100.64.7.199 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.200 + 100.64.7.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.201 + 100.64.7.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.202 + USER-0015-1186.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + INCIDENT_LINK + 1694882534 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fd9ba4f0-54af-11ee-b23a-419638593710 + + + diff --git a/graph/incidents_graphml/f/fda44f10-446a-11ee-9b56-b315e86f4666.graphml b/graph/incidents_graphml/f/fda44f10-446a-11ee-9b56-b315e86f4666.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df4e3542c1a429a3b93f4c30a9fcae234a075b22 --- /dev/null +++ b/graph/incidents_graphml/f/fda44f10-446a-11ee-9b56-b315e86f4666.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.250 + 100.64.25.250 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693093680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fda44f10-446a-11ee-9b56-b315e86f4666 + + + diff --git a/graph/incidents_graphml/f/fda55220-1657-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/f/fda55220-1657-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ee6e720e1e4db66cdb8c03c5af097a0790bd991 --- /dev/null +++ b/graph/incidents_graphml/f/fda55220-1657-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.237 + 100.64.23.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688027766 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + fda55220-1657-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/f/fda72ff0-a2ca-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/f/fda72ff0-a2ca-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..418ae34195cfb81ef9cd954bc32d6b2ca46db960 --- /dev/null +++ b/graph/incidents_graphml/f/fda72ff0-a2ca-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.21.179 + 100.64.21.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703470321 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + fda72ff0-a2ca-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/f/fdae6d90-a7f0-11ed-af31-070b715d9bbb.graphml b/graph/incidents_graphml/f/fdae6d90-a7f0-11ed-af31-070b715d9bbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..070640144e306056c7e2051207b437f1082e3a9d --- /dev/null +++ b/graph/incidents_graphml/f/fdae6d90-a7f0-11ed-af31-070b715d9bbb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.33.119 + 172.20.33.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Windows Active Directory"] + + + HOST + 100.64.88.19 + 100.64.88.19 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1675888900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fdae6d90-a7f0-11ed-af31-070b715d9bbb + + + INCIDENT_LINK + 1675888900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + fdae6d90-a7f0-11ed-af31-070b715d9bbb + + +