f15hb0wn commited on
Commit
d563eb0
·
verified ·
1 Parent(s): d94b1bb

Upload per-incident GraphML sharded batch 6/27

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml +63 -0
  2. graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml +63 -0
  3. graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml +113 -0
  4. graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml +63 -0
  5. graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml +63 -0
  6. graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml +63 -0
  7. graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml +63 -0
  8. graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml +63 -0
  9. graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml +63 -0
  10. graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml +63 -0
  11. graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml +77 -0
  12. graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml +77 -0
  13. graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml +401 -0
  14. graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml +545 -0
  15. graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml +113 -0
  16. graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml +63 -0
  17. graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
  18. graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml +185 -0
  19. graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml +63 -0
  20. graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
  21. graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml +63 -0
  22. graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml +767 -0
  23. graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml +63 -0
  24. graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml +63 -0
  25. graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml +63 -0
  26. graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml +63 -0
  27. graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml +63 -0
  28. graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml +63 -0
  29. graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  30. graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml +63 -0
  31. graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  32. graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml +63 -0
  33. graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml +185 -0
  34. graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  35. graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml +63 -0
  36. graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml +85 -0
  37. graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
  38. graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml +63 -0
  39. graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml +85 -0
  40. graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  41. graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
  42. graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml +221 -0
  43. graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  44. graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
  45. graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  46. graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml +63 -0
  47. graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml +77 -0
  48. graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
  49. graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml +113 -0
  50. graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml +63 -0
graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="620da8c1-0858-11ed-a899-4d3ecd010a17">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.74.211.215</data>
35
+ <data key="n_hostname">10.74.211.215</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]</data>
39
+ </node>
40
+ <node id="14dc1712-1c46-11ed-bdbb-23984f032296">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.113</data>
43
+ <data key="n_hostname">100.64.86.113</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16910" target="HOST-17183">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660536630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">334e14f0-1c50-11ed-bd09-797a43d85ced</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2f0075e1-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.232.220</data>
35
+ <data key="n_hostname">172.16.232.220</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="aef8aba0-53e6-11ee-970d-e1cd66fbc004">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.53.235</data>
43
+ <data key="n_hostname">100.64.53.235</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2748" target="HOST-9310">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1695920288</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">335077a0-5e20-11ee-a8d3-61b0fc50a12d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="ad8358a5-4506-11ed-8cb4-97c68ded5bad">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.81.158</data>
35
+ <data key="n_hostname">100.64.81.158</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="11bd0742-41aa-11ed-a587-21753cf039e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.126</data>
43
+ <data key="n_hostname">100.64.71.126</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <node id="1b13bb40-4533-11ed-a7a1-d3211d98fc96">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.81.159</data>
51
+ <data key="n_hostname">100.64.81.159</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="ad8358a5-4506-11ed-8cb4-97c68ded5bad" target="11bd0742-41aa-11ed-a587-21753cf039e4">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1665146418</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">33537410-463d-11ed-9048-e52ef683aaf1</data>
69
+ </edge>
70
+ <edge id="e2" source="11bd0742-41aa-11ed-a587-21753cf039e4" target="ad8358a5-4506-11ed-8cb4-97c68ded5bad">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1665146418</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">33537410-463d-11ed-9048-e52ef683aaf1</data>
83
+ </edge>
84
+ <edge id="e3" source="1b13bb40-4533-11ed-a7a1-d3211d98fc96" target="11bd0742-41aa-11ed-a587-21753cf039e4">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1665146418</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">33537410-463d-11ed-9048-e52ef683aaf1</data>
97
+ </edge>
98
+ <edge id="e4" source="11bd0742-41aa-11ed-a587-21753cf039e4" target="1b13bb40-4533-11ed-a7a1-d3211d98fc96">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1665146418</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">33537410-463d-11ed-9048-e52ef683aaf1</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="14dc3e21-1c46-11ed-bdbb-23984f032296">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.86.117</data>
35
+ <data key="n_hostname">100.64.86.117</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="38840493-0a79-11ed-8674-598372048324">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="14dc3e21-1c46-11ed-bdbb-23984f032296" target="HOST-16884">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660536630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">33547d90-1c50-11ed-bd09-797a43d85ced</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d457bc90-27ce-11ee-b733-9965e9514c0c">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.28.227</data>
35
+ <data key="n_hostname">100.64.28.227</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.6.172</data>
43
+ <data key="n_hostname">172.31.6.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d457bc90-27ce-11ee-b733-9965e9514c0c" target="HOST-2757">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692748455</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">335f2160-4147-11ee-a087-e963abb87ef5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="38840493-0a79-11ed-8674-598372048324">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="14dc3e21-1c46-11ed-bdbb-23984f032296">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.86.117</data>
43
+ <data key="n_hostname">100.64.86.117</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16884" target="HOST-17184">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660536630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">336100b0-1c50-11ed-bd09-797a43d85ced</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3f8cdf90-034f-11ed-8fa4-931b779220df">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.7.252</data>
35
+ <data key="n_hostname">100.64.7.252</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="38840493-0a79-11ed-8674-598372048324">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">10.221.82.8</data>
43
+ <data key="n_hostname">10.221.82.8</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
47
+ </node>
48
+ <edge id="e1" source="3f8cdf90-034f-11ed-8fa4-931b779220df" target="HOST-16884">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660536630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3365e2b0-1c50-11ed-bd09-797a43d85ced</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="feb05526-2750-11ee-a48b-8dcaf889c643">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.12.193</data>
43
+ <data key="n_hostname">100.64.12.193</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-3455">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1698990331</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3366b7b0-7a0c-11ee-9002-0de92ece484d</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="38840493-0a79-11ed-8674-598372048324">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.221.82.8</data>
35
+ <data key="n_hostname">10.221.82.8</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","Barracuda WAF"]</data>
39
+ </node>
40
+ <node id="3f8cdf90-034f-11ed-8fa4-931b779220df">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.7.252</data>
43
+ <data key="n_hostname">100.64.7.252</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-16884" target="HOST-17185">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660536630</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3370b820-1c50-11ed-bd09-797a43d85ced</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="24d1ece2-0628-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.6.172</data>
35
+ <data key="n_hostname">172.31.6.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d457bc90-27ce-11ee-b733-9965e9514c0c">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.28.227</data>
43
+ <data key="n_hostname">100.64.28.227</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2757" target="HOST-5716">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692748455</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3372f780-4147-11ee-a087-e963abb87ef5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="92c3ba51-eb29-11ec-a3bf-ef53cc386535">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.2.213</data>
35
+ <data key="n_hostname">100.64.2.213</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="fda718f0-0c10-11ed-a8e8-772bc24fdd89">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.216</data>
43
+ <data key="n_hostname">100.64.71.216</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="92c3ba51-eb29-11ec-a3bf-ef53cc386535" target="HOST-13685">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1660685665</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">3374f730-1dab-11ed-b2e7-abaef9f1b8f2</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13685" target="92c3ba51-eb29-11ec-a3bf-ef53cc386535">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1660685665</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">3374f730-1dab-11ed-b2e7-abaef9f1b8f2</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="9dd68951-b48b-11ed-8f8c-73caf3082975">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.80.46</data>
35
+ <data key="n_hostname">100.64.80.46</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="416a79c2-9d8d-11ed-98f8-cd6642d241c0">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.147</data>
43
+ <data key="n_hostname">100.64.72.147</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="9dd68951-b48b-11ed-8f8c-73caf3082975" target="HOST-13531">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1677324369</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">337529d0-b4ff-11ed-bb53-cb33bcdbc12a</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-13531" target="9dd68951-b48b-11ed-8f8c-73caf3082975">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1677324369</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.71875</data>
67
+ <data key="e_suspicion_score">0.71875</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Disrupted</data>
74
+ <data key="e_incident_id">337529d0-b4ff-11ed-bb53-cb33bcdbc12a</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml ADDED
@@ -0,0 +1,401 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c18c5a21-9d87-11ed-9ba1-69c845a45d44">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.71.123</data>
35
+ <data key="n_hostname">100.64.71.123</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
39
+ </node>
40
+ <node id="f47eb931-9feb-11ed-8141-81af1a9e1d7a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.80.47</data>
43
+ <data key="n_hostname">100.64.80.47</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
47
+ </node>
48
+ <node id="b138da13-9eac-11ed-a22c-f97846631397">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.47.45</data>
51
+ <data key="n_hostname">100.64.47.45</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.68359375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="2eccc0a3-9db7-11ed-8d53-2b8af123e178">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.16.220</data>
59
+ <data key="n_hostname">100.64.16.220</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.9905078125</data>
62
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
63
+ </node>
64
+ <node id="d93dd830-9d8a-11ed-9ba1-69c845a45d44">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.71.82</data>
67
+ <data key="n_hostname">100.64.71.82</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.71875</data>
70
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
71
+ </node>
72
+ <node id="23d32390-b470-11ed-9a95-f1faac84b6f1">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.80.48</data>
75
+ <data key="n_hostname">100.64.80.48</data>
76
+ <data key="n_set_roles">["Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.578125</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="d6f09ec0-9d88-11ed-98f8-cd6642d241c0">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.72.173</data>
83
+ <data key="n_hostname">100.64.72.173</data>
84
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
85
+ <data key="n_suspicion_score">0.841796875</data>
86
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
87
+ </node>
88
+ <node id="37e79e44-9d89-11ed-98f8-cd6642d241c0">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.71.218</data>
91
+ <data key="n_hostname">100.64.71.218</data>
92
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
95
+ </node>
96
+ <node id="9ceb2631-b4ff-11ed-a270-8d764d3d89e3">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.80.49</data>
99
+ <data key="n_hostname">100.64.80.49</data>
100
+ <data key="n_set_roles">["Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.578125</data>
102
+ <data key="n_products">["Precinct","Meraki"]</data>
103
+ </node>
104
+ <node id="cb603175-9daf-11ed-8d53-2b8af123e178">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.9.254</data>
107
+ <data key="n_hostname">100.64.9.254</data>
108
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
111
+ </node>
112
+ <node id="afe4fcd1-9d8e-11ed-9ba1-69c845a45d44">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.78.157</data>
115
+ <data key="n_hostname">100.64.78.157</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
119
+ </node>
120
+ <edge id="e1" source="c18c5a21-9d87-11ed-9ba1-69c845a45d44" target="f47eb931-9feb-11ed-8141-81af1a9e1d7a">
121
+ <data key="e_type">INCIDENT_LINK</data>
122
+ <data key="e_timestamp">1677324369</data>
123
+ <data key="e_label_binary">malicious</data>
124
+ <data key="e_label_confidence">0.9905078125</data>
125
+ <data key="e_suspicion_score">0.9905078125</data>
126
+ <data key="e_mo_name">Data Theft</data>
127
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
128
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
129
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
130
+ <data key="e_lifecycle_stage">complete-mission</data>
131
+ <data key="e_disposition">Disrupted</data>
132
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
133
+ </edge>
134
+ <edge id="e2" source="f47eb931-9feb-11ed-8141-81af1a9e1d7a" target="c18c5a21-9d87-11ed-9ba1-69c845a45d44">
135
+ <data key="e_type">INCIDENT_LINK</data>
136
+ <data key="e_timestamp">1677324369</data>
137
+ <data key="e_label_binary">malicious</data>
138
+ <data key="e_label_confidence">0.9905078125</data>
139
+ <data key="e_suspicion_score">0.9905078125</data>
140
+ <data key="e_mo_name">Data Theft</data>
141
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
142
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
143
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
144
+ <data key="e_lifecycle_stage">complete-mission</data>
145
+ <data key="e_disposition">Disrupted</data>
146
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
147
+ </edge>
148
+ <edge id="e3" source="b138da13-9eac-11ed-a22c-f97846631397" target="c18c5a21-9d87-11ed-9ba1-69c845a45d44">
149
+ <data key="e_type">INCIDENT_LINK</data>
150
+ <data key="e_timestamp">1677324369</data>
151
+ <data key="e_label_binary">malicious</data>
152
+ <data key="e_label_confidence">0.9905078125</data>
153
+ <data key="e_suspicion_score">0.9905078125</data>
154
+ <data key="e_mo_name">Data Theft</data>
155
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
156
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
157
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
158
+ <data key="e_lifecycle_stage">complete-mission</data>
159
+ <data key="e_disposition">Disrupted</data>
160
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
161
+ </edge>
162
+ <edge id="e4" source="c18c5a21-9d87-11ed-9ba1-69c845a45d44" target="b138da13-9eac-11ed-a22c-f97846631397">
163
+ <data key="e_type">INCIDENT_LINK</data>
164
+ <data key="e_timestamp">1677324369</data>
165
+ <data key="e_label_binary">malicious</data>
166
+ <data key="e_label_confidence">0.9905078125</data>
167
+ <data key="e_suspicion_score">0.9905078125</data>
168
+ <data key="e_mo_name">Data Theft</data>
169
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
170
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
171
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
172
+ <data key="e_lifecycle_stage">complete-mission</data>
173
+ <data key="e_disposition">Disrupted</data>
174
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
175
+ </edge>
176
+ <edge id="e5" source="HOST-13133" target="HOST-13927">
177
+ <data key="e_type">INCIDENT_LINK</data>
178
+ <data key="e_timestamp">1677324369</data>
179
+ <data key="e_label_binary">malicious</data>
180
+ <data key="e_label_confidence">0.9905078125</data>
181
+ <data key="e_suspicion_score">0.9905078125</data>
182
+ <data key="e_mo_name">Data Theft</data>
183
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
184
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
185
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
186
+ <data key="e_lifecycle_stage">complete-mission</data>
187
+ <data key="e_disposition">Disrupted</data>
188
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
189
+ </edge>
190
+ <edge id="e6" source="HOST-13927" target="HOST-13133">
191
+ <data key="e_type">INCIDENT_LINK</data>
192
+ <data key="e_timestamp">1677324369</data>
193
+ <data key="e_label_binary">malicious</data>
194
+ <data key="e_label_confidence">0.9905078125</data>
195
+ <data key="e_suspicion_score">0.9905078125</data>
196
+ <data key="e_mo_name">Data Theft</data>
197
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
198
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
199
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
200
+ <data key="e_lifecycle_stage">complete-mission</data>
201
+ <data key="e_disposition">Disrupted</data>
202
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
203
+ </edge>
204
+ <edge id="e7" source="23d32390-b470-11ed-9a95-f1faac84b6f1" target="HOST-13041">
205
+ <data key="e_type">INCIDENT_LINK</data>
206
+ <data key="e_timestamp">1677324369</data>
207
+ <data key="e_label_binary">malicious</data>
208
+ <data key="e_label_confidence">0.9905078125</data>
209
+ <data key="e_suspicion_score">0.9905078125</data>
210
+ <data key="e_mo_name">Data Theft</data>
211
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
212
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
213
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
214
+ <data key="e_lifecycle_stage">complete-mission</data>
215
+ <data key="e_disposition">Disrupted</data>
216
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
217
+ </edge>
218
+ <edge id="e8" source="HOST-13041" target="23d32390-b470-11ed-9a95-f1faac84b6f1">
219
+ <data key="e_type">INCIDENT_LINK</data>
220
+ <data key="e_timestamp">1677324369</data>
221
+ <data key="e_label_binary">malicious</data>
222
+ <data key="e_label_confidence">0.9905078125</data>
223
+ <data key="e_suspicion_score">0.9905078125</data>
224
+ <data key="e_mo_name">Data Theft</data>
225
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
226
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
227
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
228
+ <data key="e_lifecycle_stage">complete-mission</data>
229
+ <data key="e_disposition">Disrupted</data>
230
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
231
+ </edge>
232
+ <edge id="e9" source="HOST-13133" target="HOST-13041">
233
+ <data key="e_type">INCIDENT_LINK</data>
234
+ <data key="e_timestamp">1677324369</data>
235
+ <data key="e_label_binary">malicious</data>
236
+ <data key="e_label_confidence">0.9905078125</data>
237
+ <data key="e_suspicion_score">0.9905078125</data>
238
+ <data key="e_mo_name">Data Theft</data>
239
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
240
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
241
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
242
+ <data key="e_lifecycle_stage">complete-mission</data>
243
+ <data key="e_disposition">Disrupted</data>
244
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
245
+ </edge>
246
+ <edge id="e10" source="HOST-13041" target="HOST-13133">
247
+ <data key="e_type">INCIDENT_LINK</data>
248
+ <data key="e_timestamp">1677324369</data>
249
+ <data key="e_label_binary">malicious</data>
250
+ <data key="e_label_confidence">0.9905078125</data>
251
+ <data key="e_suspicion_score">0.9905078125</data>
252
+ <data key="e_mo_name">Data Theft</data>
253
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
254
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
255
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
256
+ <data key="e_lifecycle_stage">complete-mission</data>
257
+ <data key="e_disposition">Disrupted</data>
258
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
259
+ </edge>
260
+ <edge id="e11" source="b138da13-9eac-11ed-a22c-f97846631397" target="HOST-13927">
261
+ <data key="e_type">INCIDENT_LINK</data>
262
+ <data key="e_timestamp">1677324369</data>
263
+ <data key="e_label_binary">malicious</data>
264
+ <data key="e_label_confidence">0.9905078125</data>
265
+ <data key="e_suspicion_score">0.9905078125</data>
266
+ <data key="e_mo_name">Data Theft</data>
267
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
268
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
269
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
270
+ <data key="e_lifecycle_stage">complete-mission</data>
271
+ <data key="e_disposition">Disrupted</data>
272
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
273
+ </edge>
274
+ <edge id="e12" source="HOST-13927" target="b138da13-9eac-11ed-a22c-f97846631397">
275
+ <data key="e_type">INCIDENT_LINK</data>
276
+ <data key="e_timestamp">1677324369</data>
277
+ <data key="e_label_binary">malicious</data>
278
+ <data key="e_label_confidence">0.9905078125</data>
279
+ <data key="e_suspicion_score">0.9905078125</data>
280
+ <data key="e_mo_name">Data Theft</data>
281
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
282
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
283
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
284
+ <data key="e_lifecycle_stage">complete-mission</data>
285
+ <data key="e_disposition">Disrupted</data>
286
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
287
+ </edge>
288
+ <edge id="e13" source="b138da13-9eac-11ed-a22c-f97846631397" target="HOST-13136">
289
+ <data key="e_type">INCIDENT_LINK</data>
290
+ <data key="e_timestamp">1677324369</data>
291
+ <data key="e_label_binary">malicious</data>
292
+ <data key="e_label_confidence">0.9905078125</data>
293
+ <data key="e_suspicion_score">0.9905078125</data>
294
+ <data key="e_mo_name">Data Theft</data>
295
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
296
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
297
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
298
+ <data key="e_lifecycle_stage">complete-mission</data>
299
+ <data key="e_disposition">Disrupted</data>
300
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
301
+ </edge>
302
+ <edge id="e14" source="HOST-13136" target="b138da13-9eac-11ed-a22c-f97846631397">
303
+ <data key="e_type">INCIDENT_LINK</data>
304
+ <data key="e_timestamp">1677324369</data>
305
+ <data key="e_label_binary">malicious</data>
306
+ <data key="e_label_confidence">0.9905078125</data>
307
+ <data key="e_suspicion_score">0.9905078125</data>
308
+ <data key="e_mo_name">Data Theft</data>
309
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
310
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
311
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
312
+ <data key="e_lifecycle_stage">complete-mission</data>
313
+ <data key="e_disposition">Disrupted</data>
314
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
315
+ </edge>
316
+ <edge id="e15" source="9ceb2631-b4ff-11ed-a270-8d764d3d89e3" target="HOST-13041">
317
+ <data key="e_type">INCIDENT_LINK</data>
318
+ <data key="e_timestamp">1677324369</data>
319
+ <data key="e_label_binary">malicious</data>
320
+ <data key="e_label_confidence">0.9905078125</data>
321
+ <data key="e_suspicion_score">0.9905078125</data>
322
+ <data key="e_mo_name">Data Theft</data>
323
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
324
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
325
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
326
+ <data key="e_lifecycle_stage">complete-mission</data>
327
+ <data key="e_disposition">Disrupted</data>
328
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
329
+ </edge>
330
+ <edge id="e16" source="HOST-13041" target="9ceb2631-b4ff-11ed-a270-8d764d3d89e3">
331
+ <data key="e_type">INCIDENT_LINK</data>
332
+ <data key="e_timestamp">1677324369</data>
333
+ <data key="e_label_binary">malicious</data>
334
+ <data key="e_label_confidence">0.9905078125</data>
335
+ <data key="e_suspicion_score">0.9905078125</data>
336
+ <data key="e_mo_name">Data Theft</data>
337
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
338
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
339
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
340
+ <data key="e_lifecycle_stage">complete-mission</data>
341
+ <data key="e_disposition">Disrupted</data>
342
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
343
+ </edge>
344
+ <edge id="e17" source="cb603175-9daf-11ed-8d53-2b8af123e178" target="HOST-15425">
345
+ <data key="e_type">INCIDENT_LINK</data>
346
+ <data key="e_timestamp">1677324369</data>
347
+ <data key="e_label_binary">malicious</data>
348
+ <data key="e_label_confidence">0.9905078125</data>
349
+ <data key="e_suspicion_score">0.9905078125</data>
350
+ <data key="e_mo_name">Data Theft</data>
351
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
352
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
353
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
354
+ <data key="e_lifecycle_stage">complete-mission</data>
355
+ <data key="e_disposition">Disrupted</data>
356
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
357
+ </edge>
358
+ <edge id="e18" source="HOST-15425" target="cb603175-9daf-11ed-8d53-2b8af123e178">
359
+ <data key="e_type">INCIDENT_LINK</data>
360
+ <data key="e_timestamp">1677324369</data>
361
+ <data key="e_label_binary">malicious</data>
362
+ <data key="e_label_confidence">0.9905078125</data>
363
+ <data key="e_suspicion_score">0.9905078125</data>
364
+ <data key="e_mo_name">Data Theft</data>
365
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
366
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
367
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
368
+ <data key="e_lifecycle_stage">complete-mission</data>
369
+ <data key="e_disposition">Disrupted</data>
370
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
371
+ </edge>
372
+ <edge id="e19" source="HOST-13133" target="HOST-15425">
373
+ <data key="e_type">INCIDENT_LINK</data>
374
+ <data key="e_timestamp">1677324369</data>
375
+ <data key="e_label_binary">malicious</data>
376
+ <data key="e_label_confidence">0.9905078125</data>
377
+ <data key="e_suspicion_score">0.9905078125</data>
378
+ <data key="e_mo_name">Data Theft</data>
379
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
380
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
381
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
382
+ <data key="e_lifecycle_stage">complete-mission</data>
383
+ <data key="e_disposition">Disrupted</data>
384
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
385
+ </edge>
386
+ <edge id="e20" source="HOST-15425" target="HOST-13133">
387
+ <data key="e_type">INCIDENT_LINK</data>
388
+ <data key="e_timestamp">1677324369</data>
389
+ <data key="e_label_binary">malicious</data>
390
+ <data key="e_label_confidence">0.9905078125</data>
391
+ <data key="e_suspicion_score">0.9905078125</data>
392
+ <data key="e_mo_name">Data Theft</data>
393
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
394
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
395
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
396
+ <data key="e_lifecycle_stage">complete-mission</data>
397
+ <data key="e_disposition">Disrupted</data>
398
+ <data key="e_incident_id">3376fe90-b4ff-11ed-bb53-cb33bcdbc12a</data>
399
+ </edge>
400
+ </graph>
401
+ </graphml>
graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml ADDED
@@ -0,0 +1,545 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dbacf8e3-14d1-11ed-baad-a3de1133c17e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.1.226</data>
35
+ <data key="n_hostname">100.64.1.226</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.841796875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="15412b40-ea92-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.72.209</data>
43
+ <data key="n_hostname">100.64.72.209</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="eaffe880-ea91-11ec-90c7-eff83c975df3">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.76.112</data>
51
+ <data key="n_hostname">100.64.76.112</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
55
+ </node>
56
+ <node id="e86b1a31-1d91-11ed-afcb-65334b71cb53">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.76.113</data>
59
+ <data key="n_hostname">100.64.76.113</data>
60
+ <data key="n_set_roles">["Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.578125</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.72.73</data>
67
+ <data key="n_hostname">100.64.72.73</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.841796875</data>
70
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
71
+ </node>
72
+ <node id="98d5ec40-1b55-11ed-a06b-0fb5d485c65e">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.76.114</data>
75
+ <data key="n_hostname">100.64.76.114</data>
76
+ <data key="n_set_roles">["Exploiting Target"]</data>
77
+ <data key="n_suspicion_score">0.4375</data>
78
+ <data key="n_products">["Precinct","Meraki"]</data>
79
+ </node>
80
+ <node id="7b571bf3-1c93-11ed-b108-256aef98e5c6">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.11.177</data>
83
+ <data key="n_hostname">100.64.11.177</data>
84
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.7890625</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="41c13198-ebde-11ec-a85d-799259e26f0b">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.76.115</data>
91
+ <data key="n_hostname">100.64.76.115</data>
92
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
93
+ <data key="n_suspicion_score">0.71875</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="db80eda0-ea91-11ec-90c7-eff83c975df3">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">100.64.73.56</data>
99
+ <data key="n_hostname">HOST-13203</data>
100
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
101
+ <data key="n_suspicion_score">0.7890625</data>
102
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
103
+ </node>
104
+ <node id="9ade6c65-084f-11ed-bc9b-516890f4a4f8">
105
+ <data key="n_type">HOST</data>
106
+ <data key="n_ip">100.64.72.58</data>
107
+ <data key="n_hostname">100.64.72.58</data>
108
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
109
+ <data key="n_suspicion_score">0.71875</data>
110
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
111
+ </node>
112
+ <node id="8e63c230-ea92-11ec-abf7-619673fe2558">
113
+ <data key="n_type">HOST</data>
114
+ <data key="n_ip">100.64.9.120</data>
115
+ <data key="n_hostname">100.64.9.120</data>
116
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
117
+ <data key="n_suspicion_score">0.71875</data>
118
+ <data key="n_products">["Precinct","Meraki"]</data>
119
+ </node>
120
+ <node id="e054e3e0-ea91-11ec-abf7-619673fe2558">
121
+ <data key="n_type">HOST</data>
122
+ <data key="n_ip">100.64.73.45</data>
123
+ <data key="n_hostname">100.64.73.45</data>
124
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
125
+ <data key="n_suspicion_score">0.71875</data>
126
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
127
+ </node>
128
+ <node id="e0569190-ea91-11ec-90c7-eff83c975df3">
129
+ <data key="n_type">HOST</data>
130
+ <data key="n_ip">100.64.72.130</data>
131
+ <data key="n_hostname">100.64.72.130</data>
132
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
133
+ <data key="n_suspicion_score">0.841796875</data>
134
+ <data key="n_products">["Precinct","Meraki"]</data>
135
+ </node>
136
+ <node id="3b22a2a0-0d4a-11ed-869f-2faabe2b5955">
137
+ <data key="n_type">HOST</data>
138
+ <data key="n_ip">100.64.76.116</data>
139
+ <data key="n_hostname">100.64.76.116</data>
140
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
141
+ <data key="n_suspicion_score">0.7890625</data>
142
+ <data key="n_products">["Precinct","Meraki"]</data>
143
+ </node>
144
+ <node id="fdfa39e0-ebc2-11ec-85b9-75b8437a0901">
145
+ <data key="n_type">HOST</data>
146
+ <data key="n_ip">100.64.76.117</data>
147
+ <data key="n_hostname">100.64.76.117</data>
148
+ <data key="n_set_roles">["Exploiting Host"]</data>
149
+ <data key="n_suspicion_score">0.4375</data>
150
+ <data key="n_products">["Precinct","Meraki"]</data>
151
+ </node>
152
+ <edge id="e1" source="HOST-13772" target="HOST-13309">
153
+ <data key="e_type">INCIDENT_LINK</data>
154
+ <data key="e_timestamp">1660685665</data>
155
+ <data key="e_label_binary">malicious</data>
156
+ <data key="e_label_confidence">0.841796875</data>
157
+ <data key="e_suspicion_score">0.841796875</data>
158
+ <data key="e_mo_name">Data Theft</data>
159
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
160
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
161
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
162
+ <data key="e_lifecycle_stage">complete-mission</data>
163
+ <data key="e_disposition">Disrupted</data>
164
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
165
+ </edge>
166
+ <edge id="e2" source="HOST-13309" target="HOST-13772">
167
+ <data key="e_type">INCIDENT_LINK</data>
168
+ <data key="e_timestamp">1660685665</data>
169
+ <data key="e_label_binary">malicious</data>
170
+ <data key="e_label_confidence">0.841796875</data>
171
+ <data key="e_suspicion_score">0.841796875</data>
172
+ <data key="e_mo_name">Data Theft</data>
173
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
174
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
175
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
176
+ <data key="e_lifecycle_stage">complete-mission</data>
177
+ <data key="e_disposition">Disrupted</data>
178
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
179
+ </edge>
180
+ <edge id="e3" source="HOST-13772" target="eaffe880-ea91-11ec-90c7-eff83c975df3">
181
+ <data key="e_type">INCIDENT_LINK</data>
182
+ <data key="e_timestamp">1660685665</data>
183
+ <data key="e_label_binary">malicious</data>
184
+ <data key="e_label_confidence">0.841796875</data>
185
+ <data key="e_suspicion_score">0.841796875</data>
186
+ <data key="e_mo_name">Data Theft</data>
187
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
188
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
189
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
190
+ <data key="e_lifecycle_stage">complete-mission</data>
191
+ <data key="e_disposition">Disrupted</data>
192
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
193
+ </edge>
194
+ <edge id="e4" source="eaffe880-ea91-11ec-90c7-eff83c975df3" target="HOST-13772">
195
+ <data key="e_type">INCIDENT_LINK</data>
196
+ <data key="e_timestamp">1660685665</data>
197
+ <data key="e_label_binary">malicious</data>
198
+ <data key="e_label_confidence">0.841796875</data>
199
+ <data key="e_suspicion_score">0.841796875</data>
200
+ <data key="e_mo_name">Data Theft</data>
201
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
202
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
203
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
204
+ <data key="e_lifecycle_stage">complete-mission</data>
205
+ <data key="e_disposition">Disrupted</data>
206
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
207
+ </edge>
208
+ <edge id="e5" source="HOST-13772" target="e86b1a31-1d91-11ed-afcb-65334b71cb53">
209
+ <data key="e_type">INCIDENT_LINK</data>
210
+ <data key="e_timestamp">1660685665</data>
211
+ <data key="e_label_binary">malicious</data>
212
+ <data key="e_label_confidence">0.841796875</data>
213
+ <data key="e_suspicion_score">0.841796875</data>
214
+ <data key="e_mo_name">Data Theft</data>
215
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
216
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
217
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
218
+ <data key="e_lifecycle_stage">complete-mission</data>
219
+ <data key="e_disposition">Disrupted</data>
220
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
221
+ </edge>
222
+ <edge id="e6" source="e86b1a31-1d91-11ed-afcb-65334b71cb53" target="HOST-13772">
223
+ <data key="e_type">INCIDENT_LINK</data>
224
+ <data key="e_timestamp">1660685665</data>
225
+ <data key="e_label_binary">malicious</data>
226
+ <data key="e_label_confidence">0.841796875</data>
227
+ <data key="e_suspicion_score">0.841796875</data>
228
+ <data key="e_mo_name">Data Theft</data>
229
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
230
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
231
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
232
+ <data key="e_lifecycle_stage">complete-mission</data>
233
+ <data key="e_disposition">Disrupted</data>
234
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
235
+ </edge>
236
+ <edge id="e7" source="e6990751-0d40-11ed-9b66-1fa3f6da16ca" target="98d5ec40-1b55-11ed-a06b-0fb5d485c65e">
237
+ <data key="e_type">INCIDENT_LINK</data>
238
+ <data key="e_timestamp">1660685665</data>
239
+ <data key="e_label_binary">malicious</data>
240
+ <data key="e_label_confidence">0.841796875</data>
241
+ <data key="e_suspicion_score">0.841796875</data>
242
+ <data key="e_mo_name">Data Theft</data>
243
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
244
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
245
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
246
+ <data key="e_lifecycle_stage">complete-mission</data>
247
+ <data key="e_disposition">Disrupted</data>
248
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
249
+ </edge>
250
+ <edge id="e8" source="98d5ec40-1b55-11ed-a06b-0fb5d485c65e" target="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
251
+ <data key="e_type">INCIDENT_LINK</data>
252
+ <data key="e_timestamp">1660685665</data>
253
+ <data key="e_label_binary">malicious</data>
254
+ <data key="e_label_confidence">0.841796875</data>
255
+ <data key="e_suspicion_score">0.841796875</data>
256
+ <data key="e_mo_name">Data Theft</data>
257
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
258
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
259
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
260
+ <data key="e_lifecycle_stage">complete-mission</data>
261
+ <data key="e_disposition">Disrupted</data>
262
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
263
+ </edge>
264
+ <edge id="e9" source="7b571bf3-1c93-11ed-b108-256aef98e5c6" target="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
265
+ <data key="e_type">INCIDENT_LINK</data>
266
+ <data key="e_timestamp">1660685665</data>
267
+ <data key="e_label_binary">malicious</data>
268
+ <data key="e_label_confidence">0.841796875</data>
269
+ <data key="e_suspicion_score">0.841796875</data>
270
+ <data key="e_mo_name">Data Theft</data>
271
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
272
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
273
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
274
+ <data key="e_lifecycle_stage">complete-mission</data>
275
+ <data key="e_disposition">Disrupted</data>
276
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
277
+ </edge>
278
+ <edge id="e10" source="e6990751-0d40-11ed-9b66-1fa3f6da16ca" target="7b571bf3-1c93-11ed-b108-256aef98e5c6">
279
+ <data key="e_type">INCIDENT_LINK</data>
280
+ <data key="e_timestamp">1660685665</data>
281
+ <data key="e_label_binary">malicious</data>
282
+ <data key="e_label_confidence">0.841796875</data>
283
+ <data key="e_suspicion_score">0.841796875</data>
284
+ <data key="e_mo_name">Data Theft</data>
285
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
286
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
287
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
288
+ <data key="e_lifecycle_stage">complete-mission</data>
289
+ <data key="e_disposition">Disrupted</data>
290
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
291
+ </edge>
292
+ <edge id="e11" source="eaffe880-ea91-11ec-90c7-eff83c975df3" target="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
293
+ <data key="e_type">INCIDENT_LINK</data>
294
+ <data key="e_timestamp">1660685665</data>
295
+ <data key="e_label_binary">malicious</data>
296
+ <data key="e_label_confidence">0.841796875</data>
297
+ <data key="e_suspicion_score">0.841796875</data>
298
+ <data key="e_mo_name">Data Theft</data>
299
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
300
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
301
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
302
+ <data key="e_lifecycle_stage">complete-mission</data>
303
+ <data key="e_disposition">Disrupted</data>
304
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
305
+ </edge>
306
+ <edge id="e12" source="e6990751-0d40-11ed-9b66-1fa3f6da16ca" target="eaffe880-ea91-11ec-90c7-eff83c975df3">
307
+ <data key="e_type">INCIDENT_LINK</data>
308
+ <data key="e_timestamp">1660685665</data>
309
+ <data key="e_label_binary">malicious</data>
310
+ <data key="e_label_confidence">0.841796875</data>
311
+ <data key="e_suspicion_score">0.841796875</data>
312
+ <data key="e_mo_name">Data Theft</data>
313
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
314
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
315
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
316
+ <data key="e_lifecycle_stage">complete-mission</data>
317
+ <data key="e_disposition">Disrupted</data>
318
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
319
+ </edge>
320
+ <edge id="e13" source="41c13198-ebde-11ec-a85d-799259e26f0b" target="e6990751-0d40-11ed-9b66-1fa3f6da16ca">
321
+ <data key="e_type">INCIDENT_LINK</data>
322
+ <data key="e_timestamp">1660685665</data>
323
+ <data key="e_label_binary">malicious</data>
324
+ <data key="e_label_confidence">0.841796875</data>
325
+ <data key="e_suspicion_score">0.841796875</data>
326
+ <data key="e_mo_name">Data Theft</data>
327
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
328
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
329
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
330
+ <data key="e_lifecycle_stage">complete-mission</data>
331
+ <data key="e_disposition">Disrupted</data>
332
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
333
+ </edge>
334
+ <edge id="e14" source="e6990751-0d40-11ed-9b66-1fa3f6da16ca" target="41c13198-ebde-11ec-a85d-799259e26f0b">
335
+ <data key="e_type">INCIDENT_LINK</data>
336
+ <data key="e_timestamp">1660685665</data>
337
+ <data key="e_label_binary">malicious</data>
338
+ <data key="e_label_confidence">0.841796875</data>
339
+ <data key="e_suspicion_score">0.841796875</data>
340
+ <data key="e_mo_name">Data Theft</data>
341
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
342
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
343
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
344
+ <data key="e_lifecycle_stage">complete-mission</data>
345
+ <data key="e_disposition">Disrupted</data>
346
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
347
+ </edge>
348
+ <edge id="e15" source="HOST-13216" target="HOST-13608">
349
+ <data key="e_type">INCIDENT_LINK</data>
350
+ <data key="e_timestamp">1660685665</data>
351
+ <data key="e_label_binary">malicious</data>
352
+ <data key="e_label_confidence">0.841796875</data>
353
+ <data key="e_suspicion_score">0.841796875</data>
354
+ <data key="e_mo_name">Data Theft</data>
355
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
356
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
357
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
358
+ <data key="e_lifecycle_stage">complete-mission</data>
359
+ <data key="e_disposition">Disrupted</data>
360
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
361
+ </edge>
362
+ <edge id="e16" source="HOST-13608" target="HOST-13216">
363
+ <data key="e_type">INCIDENT_LINK</data>
364
+ <data key="e_timestamp">1660685665</data>
365
+ <data key="e_label_binary">malicious</data>
366
+ <data key="e_label_confidence">0.841796875</data>
367
+ <data key="e_suspicion_score">0.841796875</data>
368
+ <data key="e_mo_name">Data Theft</data>
369
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
370
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
371
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
372
+ <data key="e_lifecycle_stage">complete-mission</data>
373
+ <data key="e_disposition">Disrupted</data>
374
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
375
+ </edge>
376
+ <edge id="e17" source="HOST-13297" target="HOST-13197">
377
+ <data key="e_type">INCIDENT_LINK</data>
378
+ <data key="e_timestamp">1660685665</data>
379
+ <data key="e_label_binary">malicious</data>
380
+ <data key="e_label_confidence">0.841796875</data>
381
+ <data key="e_suspicion_score">0.841796875</data>
382
+ <data key="e_mo_name">Data Theft</data>
383
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
384
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
385
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
386
+ <data key="e_lifecycle_stage">complete-mission</data>
387
+ <data key="e_disposition">Disrupted</data>
388
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
389
+ </edge>
390
+ <edge id="e18" source="HOST-13197" target="HOST-13297">
391
+ <data key="e_type">INCIDENT_LINK</data>
392
+ <data key="e_timestamp">1660685665</data>
393
+ <data key="e_label_binary">malicious</data>
394
+ <data key="e_label_confidence">0.841796875</data>
395
+ <data key="e_suspicion_score">0.841796875</data>
396
+ <data key="e_mo_name">Data Theft</data>
397
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
398
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
399
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
400
+ <data key="e_lifecycle_stage">complete-mission</data>
401
+ <data key="e_disposition">Disrupted</data>
402
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
403
+ </edge>
404
+ <edge id="e19" source="HOST-13608" target="HOST-13297">
405
+ <data key="e_type">INCIDENT_LINK</data>
406
+ <data key="e_timestamp">1660685665</data>
407
+ <data key="e_label_binary">malicious</data>
408
+ <data key="e_label_confidence">0.841796875</data>
409
+ <data key="e_suspicion_score">0.841796875</data>
410
+ <data key="e_mo_name">Data Theft</data>
411
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
412
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
413
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
414
+ <data key="e_lifecycle_stage">complete-mission</data>
415
+ <data key="e_disposition">Disrupted</data>
416
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
417
+ </edge>
418
+ <edge id="e20" source="HOST-13297" target="HOST-13608">
419
+ <data key="e_type">INCIDENT_LINK</data>
420
+ <data key="e_timestamp">1660685665</data>
421
+ <data key="e_label_binary">malicious</data>
422
+ <data key="e_label_confidence">0.841796875</data>
423
+ <data key="e_suspicion_score">0.841796875</data>
424
+ <data key="e_mo_name">Data Theft</data>
425
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
426
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
427
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
428
+ <data key="e_lifecycle_stage">complete-mission</data>
429
+ <data key="e_disposition">Disrupted</data>
430
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
431
+ </edge>
432
+ <edge id="e21" source="e0569190-ea91-11ec-90c7-eff83c975df3" target="3b22a2a0-0d4a-11ed-869f-2faabe2b5955">
433
+ <data key="e_type">INCIDENT_LINK</data>
434
+ <data key="e_timestamp">1660685665</data>
435
+ <data key="e_label_binary">malicious</data>
436
+ <data key="e_label_confidence">0.841796875</data>
437
+ <data key="e_suspicion_score">0.841796875</data>
438
+ <data key="e_mo_name">Data Theft</data>
439
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
440
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
441
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
442
+ <data key="e_lifecycle_stage">complete-mission</data>
443
+ <data key="e_disposition">Disrupted</data>
444
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
445
+ </edge>
446
+ <edge id="e22" source="3b22a2a0-0d4a-11ed-869f-2faabe2b5955" target="e0569190-ea91-11ec-90c7-eff83c975df3">
447
+ <data key="e_type">INCIDENT_LINK</data>
448
+ <data key="e_timestamp">1660685665</data>
449
+ <data key="e_label_binary">malicious</data>
450
+ <data key="e_label_confidence">0.841796875</data>
451
+ <data key="e_suspicion_score">0.841796875</data>
452
+ <data key="e_mo_name">Data Theft</data>
453
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
454
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
455
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
456
+ <data key="e_lifecycle_stage">complete-mission</data>
457
+ <data key="e_disposition">Disrupted</data>
458
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
459
+ </edge>
460
+ <edge id="e23" source="HOST-13197" target="3b22a2a0-0d4a-11ed-869f-2faabe2b5955">
461
+ <data key="e_type">INCIDENT_LINK</data>
462
+ <data key="e_timestamp">1660685665</data>
463
+ <data key="e_label_binary">malicious</data>
464
+ <data key="e_label_confidence">0.841796875</data>
465
+ <data key="e_suspicion_score">0.841796875</data>
466
+ <data key="e_mo_name">Data Theft</data>
467
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
468
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
469
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
470
+ <data key="e_lifecycle_stage">complete-mission</data>
471
+ <data key="e_disposition">Disrupted</data>
472
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
473
+ </edge>
474
+ <edge id="e24" source="3b22a2a0-0d4a-11ed-869f-2faabe2b5955" target="HOST-13197">
475
+ <data key="e_type">INCIDENT_LINK</data>
476
+ <data key="e_timestamp">1660685665</data>
477
+ <data key="e_label_binary">malicious</data>
478
+ <data key="e_label_confidence">0.841796875</data>
479
+ <data key="e_suspicion_score">0.841796875</data>
480
+ <data key="e_mo_name">Data Theft</data>
481
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
482
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
483
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
484
+ <data key="e_lifecycle_stage">complete-mission</data>
485
+ <data key="e_disposition">Disrupted</data>
486
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
487
+ </edge>
488
+ <edge id="e25" source="7b571bf3-1c93-11ed-b108-256aef98e5c6" target="e0569190-ea91-11ec-90c7-eff83c975df3">
489
+ <data key="e_type">INCIDENT_LINK</data>
490
+ <data key="e_timestamp">1660685665</data>
491
+ <data key="e_label_binary">malicious</data>
492
+ <data key="e_label_confidence">0.841796875</data>
493
+ <data key="e_suspicion_score">0.841796875</data>
494
+ <data key="e_mo_name">Data Theft</data>
495
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
496
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
497
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
498
+ <data key="e_lifecycle_stage">complete-mission</data>
499
+ <data key="e_disposition">Disrupted</data>
500
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
501
+ </edge>
502
+ <edge id="e26" source="e0569190-ea91-11ec-90c7-eff83c975df3" target="7b571bf3-1c93-11ed-b108-256aef98e5c6">
503
+ <data key="e_type">INCIDENT_LINK</data>
504
+ <data key="e_timestamp">1660685665</data>
505
+ <data key="e_label_binary">malicious</data>
506
+ <data key="e_label_confidence">0.841796875</data>
507
+ <data key="e_suspicion_score">0.841796875</data>
508
+ <data key="e_mo_name">Data Theft</data>
509
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
510
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
511
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
512
+ <data key="e_lifecycle_stage">complete-mission</data>
513
+ <data key="e_disposition">Disrupted</data>
514
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
515
+ </edge>
516
+ <edge id="e27" source="fdfa39e0-ebc2-11ec-85b9-75b8437a0901" target="e0569190-ea91-11ec-90c7-eff83c975df3">
517
+ <data key="e_type">INCIDENT_LINK</data>
518
+ <data key="e_timestamp">1660685665</data>
519
+ <data key="e_label_binary">malicious</data>
520
+ <data key="e_label_confidence">0.841796875</data>
521
+ <data key="e_suspicion_score">0.841796875</data>
522
+ <data key="e_mo_name">Data Theft</data>
523
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
524
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
525
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
526
+ <data key="e_lifecycle_stage">complete-mission</data>
527
+ <data key="e_disposition">Disrupted</data>
528
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
529
+ </edge>
530
+ <edge id="e28" source="e0569190-ea91-11ec-90c7-eff83c975df3" target="fdfa39e0-ebc2-11ec-85b9-75b8437a0901">
531
+ <data key="e_type">INCIDENT_LINK</data>
532
+ <data key="e_timestamp">1660685665</data>
533
+ <data key="e_label_binary">malicious</data>
534
+ <data key="e_label_confidence">0.841796875</data>
535
+ <data key="e_suspicion_score">0.841796875</data>
536
+ <data key="e_mo_name">Data Theft</data>
537
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
538
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
539
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
540
+ <data key="e_lifecycle_stage">complete-mission</data>
541
+ <data key="e_disposition">Disrupted</data>
542
+ <data key="e_incident_id">33839d30-1dab-11ed-b2e7-abaef9f1b8f2</data>
543
+ </edge>
544
+ </graph>
545
+ </graphml>
graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e3a94cc0-ea96-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.118</data>
35
+ <data key="n_hostname">100.64.76.118</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="eb9973f0-f938-11ec-b853-27903fcb4ee8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.74.13</data>
43
+ <data key="n_hostname">100.64.74.13</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="268acfe0-1aa9-11ed-b9eb-cf5c9e06d505">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.76.119</data>
51
+ <data key="n_hostname">100.64.76.119</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.4375</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <edge id="e1" source="e3a94cc0-ea96-11ec-90c7-eff83c975df3" target="eb9973f0-f938-11ec-b853-27903fcb4ee8">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1660685665</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.71875</data>
61
+ <data key="e_suspicion_score">0.71875</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">33863540-1dab-11ed-b2e7-abaef9f1b8f2</data>
69
+ </edge>
70
+ <edge id="e2" source="eb9973f0-f938-11ec-b853-27903fcb4ee8" target="e3a94cc0-ea96-11ec-90c7-eff83c975df3">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1660685665</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.71875</data>
75
+ <data key="e_suspicion_score">0.71875</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">33863540-1dab-11ed-b2e7-abaef9f1b8f2</data>
83
+ </edge>
84
+ <edge id="e3" source="268acfe0-1aa9-11ed-b9eb-cf5c9e06d505" target="eb9973f0-f938-11ec-b853-27903fcb4ee8">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1660685665</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.71875</data>
89
+ <data key="e_suspicion_score">0.71875</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">33863540-1dab-11ed-b2e7-abaef9f1b8f2</data>
97
+ </edge>
98
+ <edge id="e4" source="eb9973f0-f938-11ec-b853-27903fcb4ee8" target="268acfe0-1aa9-11ed-b9eb-cf5c9e06d505">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1660685665</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.71875</data>
103
+ <data key="e_suspicion_score">0.71875</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">33863540-1dab-11ed-b2e7-abaef9f1b8f2</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85661a0-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.70.227</data>
35
+ <data key="n_hostname">100.64.70.227</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.89453125</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="11a26402-2024-11ed-b732-e985bfb82d67">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.83.74</data>
43
+ <data key="n_hostname">100.64.83.74</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-12604" target="11a26402-2024-11ed-b732-e985bfb82d67">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661661053</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.89453125</data>
53
+ <data key="e_suspicion_score">0.89453125</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">338e2790-268a-11ed-ad3b-a34fab330a0e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="bb0f82c2-373e-11ee-b5b3-f32abd245e5b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.13.70</data>
35
+ <data key="n_hostname">100.64.13.70</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3533" target="HOST-2865">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288672</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">338edeb0-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="31847e31-02ef-11ee-b701-e18d292095b4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.76.152</data>
35
+ <data key="n_hostname">100.64.76.152</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="4bb8df70-9d8d-11ed-9ba1-69c845a45d44">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.71.181</data>
43
+ <data key="n_hostname">100.64.71.181</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.89453125</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]</data>
47
+ </node>
48
+ <node id="f186a970-9e2b-11ed-87c8-ebbd1fa970b1">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.19.14</data>
51
+ <data key="n_hostname">100.64.19.14</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki"]</data>
55
+ </node>
56
+ <node id="ec4dd232-dc79-11ed-8548-81586082e2a5">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.76.153</data>
59
+ <data key="n_hostname">100.64.76.153</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="cd5bdaa0-f4f4-11ed-81d7-69a0ee6e8af2">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.76.154</data>
67
+ <data key="n_hostname">100.64.76.154</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","Meraki","Stealthwatch"]</data>
71
+ </node>
72
+ <edge id="e1" source="31847e31-02ef-11ee-b701-e18d292095b4" target="4bb8df70-9d8d-11ed-9ba1-69c845a45d44">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1685893688</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.89453125</data>
77
+ <data key="e_suspicion_score">0.89453125</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
85
+ </edge>
86
+ <edge id="e2" source="4bb8df70-9d8d-11ed-9ba1-69c845a45d44" target="31847e31-02ef-11ee-b701-e18d292095b4">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1685893688</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.89453125</data>
91
+ <data key="e_suspicion_score">0.89453125</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
99
+ </edge>
100
+ <edge id="e3" source="f186a970-9e2b-11ed-87c8-ebbd1fa970b1" target="4bb8df70-9d8d-11ed-9ba1-69c845a45d44">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1685893688</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.89453125</data>
105
+ <data key="e_suspicion_score">0.89453125</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
113
+ </edge>
114
+ <edge id="e4" source="4bb8df70-9d8d-11ed-9ba1-69c845a45d44" target="f186a970-9e2b-11ed-87c8-ebbd1fa970b1">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1685893688</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.89453125</data>
119
+ <data key="e_suspicion_score">0.89453125</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
127
+ </edge>
128
+ <edge id="e5" source="4bb8df70-9d8d-11ed-9ba1-69c845a45d44" target="ec4dd232-dc79-11ed-8548-81586082e2a5">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1685893688</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.89453125</data>
133
+ <data key="e_suspicion_score">0.89453125</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
141
+ </edge>
142
+ <edge id="e6" source="ec4dd232-dc79-11ed-8548-81586082e2a5" target="4bb8df70-9d8d-11ed-9ba1-69c845a45d44">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1685893688</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.89453125</data>
147
+ <data key="e_suspicion_score">0.89453125</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
155
+ </edge>
156
+ <edge id="e7" source="cd5bdaa0-f4f4-11ed-81d7-69a0ee6e8af2" target="4bb8df70-9d8d-11ed-9ba1-69c845a45d44">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1685893688</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.89453125</data>
161
+ <data key="e_suspicion_score">0.89453125</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
169
+ </edge>
170
+ <edge id="e8" source="4bb8df70-9d8d-11ed-9ba1-69c845a45d44" target="cd5bdaa0-f4f4-11ed-81d7-69a0ee6e8af2">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1685893688</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.89453125</data>
175
+ <data key="e_suspicion_score">0.89453125</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">3390a1e0-02ef-11ee-800b-d36f3c94df97</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="57a92660-0669-11ee-a8ac-bb5c5fd6d88d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.53.7</data>
35
+ <data key="n_hostname">100.64.53.7</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.174.172</data>
43
+ <data key="n_hostname">172.30.174.172</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="57a92660-0669-11ee-a8ac-bb5c5fd6d88d" target="HOST-2946">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691339707</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">339528f0-3477-11ee-95f5-05a30bfe2201</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="72c79372-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.23.168.229</data>
35
+ <data key="n_hostname">172.23.168.229</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="bb0f82c2-373e-11ee-b5b3-f32abd245e5b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.13.70</data>
43
+ <data key="n_hostname">100.64.13.70</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2865" target="HOST-3533">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288673</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">33a6d380-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fc7526c0-fc51-11ed-8bed-91ec48dd3b46">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.20.183</data>
35
+ <data key="n_hostname">100.64.20.183</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="00aa1332-c823-11ed-b38f-718276329dbf">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.31.78.41</data>
43
+ <data key="n_hostname">172.31.78.41</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="fc7526c0-fc51-11ed-8bed-91ec48dd3b46" target="HOST-3147">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685210359</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">33c53e60-fcb8-11ed-bdca-e96ab691d6d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml ADDED
@@ -0,0 +1,767 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c59b3db0-41a8-11ed-a587-21753cf039e4">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.75.213</data>
35
+ <data key="n_hostname">100.64.75.213</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
39
+ </node>
40
+ <node id="59caaf81-41a8-11ed-a587-21753cf039e4">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.75.181</data>
43
+ <data key="n_hostname">100.64.75.181</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
47
+ </node>
48
+ <node id="dbaefeb0-2309-11ed-9433-6d0e6f949f18">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.55.189</data>
51
+ <data key="n_hostname">100.64.55.189</data>
52
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
53
+ <data key="n_suspicion_score">0.7890625</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
55
+ </node>
56
+ <node id="a18f2ee1-41a8-11ed-8309-03853e266523">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.81.160</data>
59
+ <data key="n_hostname">100.64.81.160</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.7890625</data>
62
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]</data>
63
+ </node>
64
+ <node id="26a1e781-4631-11ed-bdce-c529ac673098">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.1.28</data>
67
+ <data key="n_hostname">100.64.1.28</data>
68
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.980224609375</data>
70
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
71
+ </node>
72
+ <node id="1960d140-41a8-11ed-a587-21753cf039e4">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.7.250</data>
75
+ <data key="n_hostname">100.64.7.250</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
79
+ </node>
80
+ <node id="76817bd0-fa14-11ec-bb03-bf6a74a23128">
81
+ <data key="n_type">HOST</data>
82
+ <data key="n_ip">100.64.81.161</data>
83
+ <data key="n_hostname">100.64.81.161</data>
84
+ <data key="n_set_roles">["Exploiting Target"]</data>
85
+ <data key="n_suspicion_score">0.4375</data>
86
+ <data key="n_products">["Precinct","Meraki"]</data>
87
+ </node>
88
+ <node id="f22777d2-454b-11ed-9510-bf79f7962d9c">
89
+ <data key="n_type">HOST</data>
90
+ <data key="n_ip">100.64.81.162</data>
91
+ <data key="n_hostname">100.64.81.162</data>
92
+ <data key="n_set_roles">["Exploiting Host"]</data>
93
+ <data key="n_suspicion_score">0.4375</data>
94
+ <data key="n_products">["Precinct","Meraki"]</data>
95
+ </node>
96
+ <node id="2e3de200-0d47-11ed-9630-f9bf7dfe9f05">
97
+ <data key="n_type">HOST</data>
98
+ <data key="n_ip">192.168.147.151</data>
99
+ <data key="n_hostname">192.168.147.151</data>
100
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
101
+ <data key="n_suspicion_score">0.947265625</data>
102
+ <data key="n_products">["Precinct","Meraki","Umbrella","Windows Active Directory","Cisco Meraki Firewall"]</data>
103
+ </node>
104
+ <node id="c8629ee2-4157-11ed-87f0-ff762f23da03">
105
+ <data key="n_type">CRED</data>
106
+ <data key="n_credential">CRED-0009</data>
107
+ <data key="n_set_roles">["Suspicious User"]</data>
108
+ <data key="n_suspicion_score">0.8125</data>
109
+ <data key="n_products">["Umbrella"]</data>
110
+ </node>
111
+ <node id="1e9d8240-4507-11ed-8cb4-97c68ded5bad">
112
+ <data key="n_type">HOST</data>
113
+ <data key="n_ip">100.64.81.163</data>
114
+ <data key="n_hostname">100.64.81.163</data>
115
+ <data key="n_set_roles">["Exploiting Host"]</data>
116
+ <data key="n_suspicion_score">0.4375</data>
117
+ <data key="n_products">["Precinct","Meraki"]</data>
118
+ </node>
119
+ <node id="e40e7c70-41a4-11ed-a587-21753cf039e4">
120
+ <data key="n_type">HOST</data>
121
+ <data key="n_ip">100.64.71.105</data>
122
+ <data key="n_hostname">100.64.71.105</data>
123
+ <data key="n_set_roles">["Exploiting Target"]</data>
124
+ <data key="n_suspicion_score">0.4375</data>
125
+ <data key="n_products">["Precinct","Meraki","Cisco Meraki Firewall"]</data>
126
+ </node>
127
+ <node id="ba7bbb52-f025-11ec-8343-b97fbbf72c71">
128
+ <data key="n_type">HOST</data>
129
+ <data key="n_ip">100.64.81.164</data>
130
+ <data key="n_hostname">100.64.81.164</data>
131
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="n_suspicion_score">0.71875</data>
133
+ <data key="n_products">["Precinct","Meraki"]</data>
134
+ </node>
135
+ <node id="d0106a81-0ffe-11ed-830c-619e68b7982f">
136
+ <data key="n_type">HOST</data>
137
+ <data key="n_ip">100.64.1.28</data>
138
+ <data key="n_hostname">HOST-16045</data>
139
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
140
+ <data key="n_suspicion_score">0.947265625</data>
141
+ <data key="n_products">["Precinct","Umbrella","Meraki"]</data>
142
+ </node>
143
+ <node id="372dfe71-41c4-11ed-ac9c-4dcea0e37b58">
144
+ <data key="n_type">CRED</data>
145
+ <data key="n_credential">CRED-0010</data>
146
+ <data key="n_set_roles">["Suspicious User"]</data>
147
+ <data key="n_suspicion_score">0.8125</data>
148
+ <data key="n_products">["Umbrella"]</data>
149
+ </node>
150
+ <node id="88704f17-41ae-11ed-a94b-b7ef4fe26e26">
151
+ <data key="n_type">HOST</data>
152
+ <data key="n_ip">100.64.23.167</data>
153
+ <data key="n_hostname">100.64.23.167</data>
154
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
155
+ <data key="n_suspicion_score">0.71875</data>
156
+ <data key="n_products">["Precinct","Meraki"]</data>
157
+ </node>
158
+ <node id="48a35c80-0d4a-11ed-8072-c18911da47a2">
159
+ <data key="n_type">HOST</data>
160
+ <data key="n_ip">100.64.72.160</data>
161
+ <data key="n_hostname">100.64.72.160</data>
162
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
163
+ <data key="n_suspicion_score">0.9208984375</data>
164
+ <data key="n_products">["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]</data>
165
+ </node>
166
+ <node id="7a153a22-4474-11ed-a10a-0984e5cdf4f0">
167
+ <data key="n_type">HOST</data>
168
+ <data key="n_ip">100.64.81.165</data>
169
+ <data key="n_hostname">100.64.81.165</data>
170
+ <data key="n_set_roles">["Exploiting Host"]</data>
171
+ <data key="n_suspicion_score">0.578125</data>
172
+ <data key="n_products">["Precinct","Meraki"]</data>
173
+ </node>
174
+ <node id="44e26da3-4073-11ed-a8fc-fd5ed719adb2">
175
+ <data key="n_type">HOST</data>
176
+ <data key="n_ip">100.64.81.166</data>
177
+ <data key="n_hostname">100.64.81.166</data>
178
+ <data key="n_set_roles">["Exploiting Host"]</data>
179
+ <data key="n_suspicion_score">0.4375</data>
180
+ <data key="n_products">["Precinct","Meraki"]</data>
181
+ </node>
182
+ <node id="52ed76a2-eb83-11ec-a779-b361cd3361fc">
183
+ <data key="n_type">HOST</data>
184
+ <data key="n_ip">100.64.81.167</data>
185
+ <data key="n_hostname">100.64.81.167</data>
186
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
187
+ <data key="n_suspicion_score">0.71875</data>
188
+ <data key="n_products">["Precinct","Meraki"]</data>
189
+ </node>
190
+ <node id="c146f0b2-4577-11ed-9958-ef6d5986f341">
191
+ <data key="n_type">HOST</data>
192
+ <data key="n_ip">100.64.81.168</data>
193
+ <data key="n_hostname">100.64.81.168</data>
194
+ <data key="n_set_roles">["Exploiting Target"]</data>
195
+ <data key="n_suspicion_score">0.578125</data>
196
+ <data key="n_products">["Precinct","Meraki"]</data>
197
+ </node>
198
+ <node id="201ee131-44fe-11ed-aef1-43fac206239a">
199
+ <data key="n_type">HOST</data>
200
+ <data key="n_ip">100.64.81.169</data>
201
+ <data key="n_hostname">100.64.81.169</data>
202
+ <data key="n_set_roles">["Exploiting Target"]</data>
203
+ <data key="n_suspicion_score">0.4375</data>
204
+ <data key="n_products">["Precinct","Meraki"]</data>
205
+ </node>
206
+ <edge id="e1" source="HOST-13901" target="59caaf81-41a8-11ed-a587-21753cf039e4">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1665146419</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.980224609375</data>
211
+ <data key="e_suspicion_score">0.980224609375</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
219
+ </edge>
220
+ <edge id="e2" source="59caaf81-41a8-11ed-a587-21753cf039e4" target="HOST-13901">
221
+ <data key="e_type">INCIDENT_LINK</data>
222
+ <data key="e_timestamp">1665146419</data>
223
+ <data key="e_label_binary">malicious</data>
224
+ <data key="e_label_confidence">0.980224609375</data>
225
+ <data key="e_suspicion_score">0.980224609375</data>
226
+ <data key="e_mo_name">Data Theft</data>
227
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
228
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
229
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
230
+ <data key="e_lifecycle_stage">complete-mission</data>
231
+ <data key="e_disposition">Disrupted</data>
232
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
233
+ </edge>
234
+ <edge id="e3" source="59caaf81-41a8-11ed-a587-21753cf039e4" target="dbaefeb0-2309-11ed-9433-6d0e6f949f18">
235
+ <data key="e_type">INCIDENT_LINK</data>
236
+ <data key="e_timestamp">1665146419</data>
237
+ <data key="e_label_binary">malicious</data>
238
+ <data key="e_label_confidence">0.980224609375</data>
239
+ <data key="e_suspicion_score">0.980224609375</data>
240
+ <data key="e_mo_name">Data Theft</data>
241
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
242
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
243
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
244
+ <data key="e_lifecycle_stage">complete-mission</data>
245
+ <data key="e_disposition">Disrupted</data>
246
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
247
+ </edge>
248
+ <edge id="e4" source="a18f2ee1-41a8-11ed-8309-03853e266523" target="26a1e781-4631-11ed-bdce-c529ac673098">
249
+ <data key="e_type">INCIDENT_LINK</data>
250
+ <data key="e_timestamp">1665146419</data>
251
+ <data key="e_label_binary">malicious</data>
252
+ <data key="e_label_confidence">0.980224609375</data>
253
+ <data key="e_suspicion_score">0.980224609375</data>
254
+ <data key="e_mo_name">Data Theft</data>
255
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
256
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
257
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
258
+ <data key="e_lifecycle_stage">complete-mission</data>
259
+ <data key="e_disposition">Disrupted</data>
260
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
261
+ </edge>
262
+ <edge id="e5" source="26a1e781-4631-11ed-bdce-c529ac673098" target="a18f2ee1-41a8-11ed-8309-03853e266523">
263
+ <data key="e_type">INCIDENT_LINK</data>
264
+ <data key="e_timestamp">1665146419</data>
265
+ <data key="e_label_binary">malicious</data>
266
+ <data key="e_label_confidence">0.980224609375</data>
267
+ <data key="e_suspicion_score">0.980224609375</data>
268
+ <data key="e_mo_name">Data Theft</data>
269
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
270
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
271
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
272
+ <data key="e_lifecycle_stage">complete-mission</data>
273
+ <data key="e_disposition">Disrupted</data>
274
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
275
+ </edge>
276
+ <edge id="e6" source="26a1e781-4631-11ed-bdce-c529ac673098" target="1960d140-41a8-11ed-a587-21753cf039e4">
277
+ <data key="e_type">INCIDENT_LINK</data>
278
+ <data key="e_timestamp">1665146419</data>
279
+ <data key="e_label_binary">malicious</data>
280
+ <data key="e_label_confidence">0.980224609375</data>
281
+ <data key="e_suspicion_score">0.980224609375</data>
282
+ <data key="e_mo_name">Data Theft</data>
283
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
284
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
285
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
286
+ <data key="e_lifecycle_stage">complete-mission</data>
287
+ <data key="e_disposition">Disrupted</data>
288
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
289
+ </edge>
290
+ <edge id="e7" source="1960d140-41a8-11ed-a587-21753cf039e4" target="26a1e781-4631-11ed-bdce-c529ac673098">
291
+ <data key="e_type">INCIDENT_LINK</data>
292
+ <data key="e_timestamp">1665146419</data>
293
+ <data key="e_label_binary">malicious</data>
294
+ <data key="e_label_confidence">0.980224609375</data>
295
+ <data key="e_suspicion_score">0.980224609375</data>
296
+ <data key="e_mo_name">Data Theft</data>
297
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
298
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
299
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
300
+ <data key="e_lifecycle_stage">complete-mission</data>
301
+ <data key="e_disposition">Disrupted</data>
302
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
303
+ </edge>
304
+ <edge id="e8" source="26a1e781-4631-11ed-bdce-c529ac673098" target="76817bd0-fa14-11ec-bb03-bf6a74a23128">
305
+ <data key="e_type">INCIDENT_LINK</data>
306
+ <data key="e_timestamp">1665146419</data>
307
+ <data key="e_label_binary">malicious</data>
308
+ <data key="e_label_confidence">0.980224609375</data>
309
+ <data key="e_suspicion_score">0.980224609375</data>
310
+ <data key="e_mo_name">Data Theft</data>
311
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
312
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
313
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
314
+ <data key="e_lifecycle_stage">complete-mission</data>
315
+ <data key="e_disposition">Disrupted</data>
316
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
317
+ </edge>
318
+ <edge id="e9" source="76817bd0-fa14-11ec-bb03-bf6a74a23128" target="26a1e781-4631-11ed-bdce-c529ac673098">
319
+ <data key="e_type">INCIDENT_LINK</data>
320
+ <data key="e_timestamp">1665146419</data>
321
+ <data key="e_label_binary">malicious</data>
322
+ <data key="e_label_confidence">0.980224609375</data>
323
+ <data key="e_suspicion_score">0.980224609375</data>
324
+ <data key="e_mo_name">Data Theft</data>
325
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
326
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
327
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
328
+ <data key="e_lifecycle_stage">complete-mission</data>
329
+ <data key="e_disposition">Disrupted</data>
330
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
331
+ </edge>
332
+ <edge id="e10" source="f22777d2-454b-11ed-9510-bf79f7962d9c" target="26a1e781-4631-11ed-bdce-c529ac673098">
333
+ <data key="e_type">INCIDENT_LINK</data>
334
+ <data key="e_timestamp">1665146419</data>
335
+ <data key="e_label_binary">malicious</data>
336
+ <data key="e_label_confidence">0.980224609375</data>
337
+ <data key="e_suspicion_score">0.980224609375</data>
338
+ <data key="e_mo_name">Data Theft</data>
339
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
340
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
341
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
342
+ <data key="e_lifecycle_stage">complete-mission</data>
343
+ <data key="e_disposition">Disrupted</data>
344
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
345
+ </edge>
346
+ <edge id="e11" source="26a1e781-4631-11ed-bdce-c529ac673098" target="f22777d2-454b-11ed-9510-bf79f7962d9c">
347
+ <data key="e_type">INCIDENT_LINK</data>
348
+ <data key="e_timestamp">1665146419</data>
349
+ <data key="e_label_binary">malicious</data>
350
+ <data key="e_label_confidence">0.980224609375</data>
351
+ <data key="e_suspicion_score">0.980224609375</data>
352
+ <data key="e_mo_name">Data Theft</data>
353
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
354
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
355
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
356
+ <data key="e_lifecycle_stage">complete-mission</data>
357
+ <data key="e_disposition">Disrupted</data>
358
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
359
+ </edge>
360
+ <edge id="e12" source="HOST-14471" target="26a1e781-4631-11ed-bdce-c529ac673098">
361
+ <data key="e_type">INCIDENT_LINK</data>
362
+ <data key="e_timestamp">1665146419</data>
363
+ <data key="e_label_binary">malicious</data>
364
+ <data key="e_label_confidence">0.980224609375</data>
365
+ <data key="e_suspicion_score">0.980224609375</data>
366
+ <data key="e_mo_name">Data Theft</data>
367
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
368
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
369
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
370
+ <data key="e_lifecycle_stage">complete-mission</data>
371
+ <data key="e_disposition">Disrupted</data>
372
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
373
+ </edge>
374
+ <edge id="e13" source="26a1e781-4631-11ed-bdce-c529ac673098" target="HOST-14471">
375
+ <data key="e_type">INCIDENT_LINK</data>
376
+ <data key="e_timestamp">1665146419</data>
377
+ <data key="e_label_binary">malicious</data>
378
+ <data key="e_label_confidence">0.980224609375</data>
379
+ <data key="e_suspicion_score">0.980224609375</data>
380
+ <data key="e_mo_name">Data Theft</data>
381
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
382
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
383
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
384
+ <data key="e_lifecycle_stage">complete-mission</data>
385
+ <data key="e_disposition">Disrupted</data>
386
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
387
+ </edge>
388
+ <edge id="e14" source="c8629ee2-4157-11ed-87f0-ff762f23da03" target="HOST-14471">
389
+ <data key="e_type">INCIDENT_LINK</data>
390
+ <data key="e_timestamp">1665146419</data>
391
+ <data key="e_label_binary">malicious</data>
392
+ <data key="e_label_confidence">0.980224609375</data>
393
+ <data key="e_suspicion_score">0.980224609375</data>
394
+ <data key="e_mo_name">Data Theft</data>
395
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
396
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
397
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
398
+ <data key="e_lifecycle_stage">complete-mission</data>
399
+ <data key="e_disposition">Disrupted</data>
400
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
401
+ </edge>
402
+ <edge id="e15" source="c8629ee2-4157-11ed-87f0-ff762f23da03" target="26a1e781-4631-11ed-bdce-c529ac673098">
403
+ <data key="e_type">INCIDENT_LINK</data>
404
+ <data key="e_timestamp">1665146419</data>
405
+ <data key="e_label_binary">malicious</data>
406
+ <data key="e_label_confidence">0.980224609375</data>
407
+ <data key="e_suspicion_score">0.980224609375</data>
408
+ <data key="e_mo_name">Data Theft</data>
409
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
410
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
411
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
412
+ <data key="e_lifecycle_stage">complete-mission</data>
413
+ <data key="e_disposition">Disrupted</data>
414
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
415
+ </edge>
416
+ <edge id="e16" source="1e9d8240-4507-11ed-8cb4-97c68ded5bad" target="26a1e781-4631-11ed-bdce-c529ac673098">
417
+ <data key="e_type">INCIDENT_LINK</data>
418
+ <data key="e_timestamp">1665146419</data>
419
+ <data key="e_label_binary">malicious</data>
420
+ <data key="e_label_confidence">0.980224609375</data>
421
+ <data key="e_suspicion_score">0.980224609375</data>
422
+ <data key="e_mo_name">Data Theft</data>
423
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
424
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
425
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
426
+ <data key="e_lifecycle_stage">complete-mission</data>
427
+ <data key="e_disposition">Disrupted</data>
428
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
429
+ </edge>
430
+ <edge id="e17" source="26a1e781-4631-11ed-bdce-c529ac673098" target="1e9d8240-4507-11ed-8cb4-97c68ded5bad">
431
+ <data key="e_type">INCIDENT_LINK</data>
432
+ <data key="e_timestamp">1665146419</data>
433
+ <data key="e_label_binary">malicious</data>
434
+ <data key="e_label_confidence">0.980224609375</data>
435
+ <data key="e_suspicion_score">0.980224609375</data>
436
+ <data key="e_mo_name">Data Theft</data>
437
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
438
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
439
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
440
+ <data key="e_lifecycle_stage">complete-mission</data>
441
+ <data key="e_disposition">Disrupted</data>
442
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
443
+ </edge>
444
+ <edge id="e18" source="26a1e781-4631-11ed-bdce-c529ac673098" target="e40e7c70-41a4-11ed-a587-21753cf039e4">
445
+ <data key="e_type">INCIDENT_LINK</data>
446
+ <data key="e_timestamp">1665146419</data>
447
+ <data key="e_label_binary">malicious</data>
448
+ <data key="e_label_confidence">0.980224609375</data>
449
+ <data key="e_suspicion_score">0.980224609375</data>
450
+ <data key="e_mo_name">Data Theft</data>
451
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
452
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
453
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
454
+ <data key="e_lifecycle_stage">complete-mission</data>
455
+ <data key="e_disposition">Disrupted</data>
456
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
457
+ </edge>
458
+ <edge id="e19" source="e40e7c70-41a4-11ed-a587-21753cf039e4" target="26a1e781-4631-11ed-bdce-c529ac673098">
459
+ <data key="e_type">INCIDENT_LINK</data>
460
+ <data key="e_timestamp">1665146419</data>
461
+ <data key="e_label_binary">malicious</data>
462
+ <data key="e_label_confidence">0.980224609375</data>
463
+ <data key="e_suspicion_score">0.980224609375</data>
464
+ <data key="e_mo_name">Data Theft</data>
465
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
466
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
467
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
468
+ <data key="e_lifecycle_stage">complete-mission</data>
469
+ <data key="e_disposition">Disrupted</data>
470
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
471
+ </edge>
472
+ <edge id="e20" source="26a1e781-4631-11ed-bdce-c529ac673098" target="ba7bbb52-f025-11ec-8343-b97fbbf72c71">
473
+ <data key="e_type">INCIDENT_LINK</data>
474
+ <data key="e_timestamp">1665146419</data>
475
+ <data key="e_label_binary">malicious</data>
476
+ <data key="e_label_confidence">0.980224609375</data>
477
+ <data key="e_suspicion_score">0.980224609375</data>
478
+ <data key="e_mo_name">Data Theft</data>
479
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
480
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
481
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
482
+ <data key="e_lifecycle_stage">complete-mission</data>
483
+ <data key="e_disposition">Disrupted</data>
484
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
485
+ </edge>
486
+ <edge id="e21" source="ba7bbb52-f025-11ec-8343-b97fbbf72c71" target="26a1e781-4631-11ed-bdce-c529ac673098">
487
+ <data key="e_type">INCIDENT_LINK</data>
488
+ <data key="e_timestamp">1665146419</data>
489
+ <data key="e_label_binary">malicious</data>
490
+ <data key="e_label_confidence">0.980224609375</data>
491
+ <data key="e_suspicion_score">0.980224609375</data>
492
+ <data key="e_mo_name">Data Theft</data>
493
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
494
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
495
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
496
+ <data key="e_lifecycle_stage">complete-mission</data>
497
+ <data key="e_disposition">Disrupted</data>
498
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
499
+ </edge>
500
+ <edge id="e22" source="HOST-14471" target="d0106a81-0ffe-11ed-830c-619e68b7982f">
501
+ <data key="e_type">INCIDENT_LINK</data>
502
+ <data key="e_timestamp">1665146419</data>
503
+ <data key="e_label_binary">malicious</data>
504
+ <data key="e_label_confidence">0.980224609375</data>
505
+ <data key="e_suspicion_score">0.980224609375</data>
506
+ <data key="e_mo_name">Data Theft</data>
507
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
508
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
509
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
510
+ <data key="e_lifecycle_stage">complete-mission</data>
511
+ <data key="e_disposition">Disrupted</data>
512
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
513
+ </edge>
514
+ <edge id="e23" source="d0106a81-0ffe-11ed-830c-619e68b7982f" target="HOST-14471">
515
+ <data key="e_type">INCIDENT_LINK</data>
516
+ <data key="e_timestamp">1665146419</data>
517
+ <data key="e_label_binary">malicious</data>
518
+ <data key="e_label_confidence">0.980224609375</data>
519
+ <data key="e_suspicion_score">0.980224609375</data>
520
+ <data key="e_mo_name">Data Theft</data>
521
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
522
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
523
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
524
+ <data key="e_lifecycle_stage">complete-mission</data>
525
+ <data key="e_disposition">Disrupted</data>
526
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
527
+ </edge>
528
+ <edge id="e24" source="372dfe71-41c4-11ed-ac9c-4dcea0e37b58" target="d0106a81-0ffe-11ed-830c-619e68b7982f">
529
+ <data key="e_type">INCIDENT_LINK</data>
530
+ <data key="e_timestamp">1665146419</data>
531
+ <data key="e_label_binary">malicious</data>
532
+ <data key="e_label_confidence">0.980224609375</data>
533
+ <data key="e_suspicion_score">0.980224609375</data>
534
+ <data key="e_mo_name">Data Theft</data>
535
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
536
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
537
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
538
+ <data key="e_lifecycle_stage">complete-mission</data>
539
+ <data key="e_disposition">Disrupted</data>
540
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
541
+ </edge>
542
+ <edge id="e25" source="88704f17-41ae-11ed-a94b-b7ef4fe26e26" target="HOST-15295">
543
+ <data key="e_type">INCIDENT_LINK</data>
544
+ <data key="e_timestamp">1665146419</data>
545
+ <data key="e_label_binary">malicious</data>
546
+ <data key="e_label_confidence">0.980224609375</data>
547
+ <data key="e_suspicion_score">0.980224609375</data>
548
+ <data key="e_mo_name">Data Theft</data>
549
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
550
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
551
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
552
+ <data key="e_lifecycle_stage">complete-mission</data>
553
+ <data key="e_disposition">Disrupted</data>
554
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
555
+ </edge>
556
+ <edge id="e26" source="HOST-15295" target="88704f17-41ae-11ed-a94b-b7ef4fe26e26">
557
+ <data key="e_type">INCIDENT_LINK</data>
558
+ <data key="e_timestamp">1665146419</data>
559
+ <data key="e_label_binary">malicious</data>
560
+ <data key="e_label_confidence">0.980224609375</data>
561
+ <data key="e_suspicion_score">0.980224609375</data>
562
+ <data key="e_mo_name">Data Theft</data>
563
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
564
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
565
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
566
+ <data key="e_lifecycle_stage">complete-mission</data>
567
+ <data key="e_disposition">Disrupted</data>
568
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
569
+ </edge>
570
+ <edge id="e27" source="7a153a22-4474-11ed-a10a-0984e5cdf4f0" target="HOST-15295">
571
+ <data key="e_type">INCIDENT_LINK</data>
572
+ <data key="e_timestamp">1665146419</data>
573
+ <data key="e_label_binary">malicious</data>
574
+ <data key="e_label_confidence">0.980224609375</data>
575
+ <data key="e_suspicion_score">0.980224609375</data>
576
+ <data key="e_mo_name">Data Theft</data>
577
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
578
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
579
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
580
+ <data key="e_lifecycle_stage">complete-mission</data>
581
+ <data key="e_disposition">Disrupted</data>
582
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
583
+ </edge>
584
+ <edge id="e28" source="HOST-15295" target="7a153a22-4474-11ed-a10a-0984e5cdf4f0">
585
+ <data key="e_type">INCIDENT_LINK</data>
586
+ <data key="e_timestamp">1665146419</data>
587
+ <data key="e_label_binary">malicious</data>
588
+ <data key="e_label_confidence">0.980224609375</data>
589
+ <data key="e_suspicion_score">0.980224609375</data>
590
+ <data key="e_mo_name">Data Theft</data>
591
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
592
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
593
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
594
+ <data key="e_lifecycle_stage">complete-mission</data>
595
+ <data key="e_disposition">Disrupted</data>
596
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
597
+ </edge>
598
+ <edge id="e29" source="44e26da3-4073-11ed-a8fc-fd5ed719adb2" target="HOST-15295">
599
+ <data key="e_type">INCIDENT_LINK</data>
600
+ <data key="e_timestamp">1665146419</data>
601
+ <data key="e_label_binary">malicious</data>
602
+ <data key="e_label_confidence">0.980224609375</data>
603
+ <data key="e_suspicion_score">0.980224609375</data>
604
+ <data key="e_mo_name">Data Theft</data>
605
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
606
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
607
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
608
+ <data key="e_lifecycle_stage">complete-mission</data>
609
+ <data key="e_disposition">Disrupted</data>
610
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
611
+ </edge>
612
+ <edge id="e30" source="HOST-15295" target="44e26da3-4073-11ed-a8fc-fd5ed719adb2">
613
+ <data key="e_type">INCIDENT_LINK</data>
614
+ <data key="e_timestamp">1665146419</data>
615
+ <data key="e_label_binary">malicious</data>
616
+ <data key="e_label_confidence">0.980224609375</data>
617
+ <data key="e_suspicion_score">0.980224609375</data>
618
+ <data key="e_mo_name">Data Theft</data>
619
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
620
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
621
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
622
+ <data key="e_lifecycle_stage">complete-mission</data>
623
+ <data key="e_disposition">Disrupted</data>
624
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
625
+ </edge>
626
+ <edge id="e31" source="52ed76a2-eb83-11ec-a779-b361cd3361fc" target="HOST-15295">
627
+ <data key="e_type">INCIDENT_LINK</data>
628
+ <data key="e_timestamp">1665146419</data>
629
+ <data key="e_label_binary">malicious</data>
630
+ <data key="e_label_confidence">0.980224609375</data>
631
+ <data key="e_suspicion_score">0.980224609375</data>
632
+ <data key="e_mo_name">Data Theft</data>
633
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
634
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
635
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
636
+ <data key="e_lifecycle_stage">complete-mission</data>
637
+ <data key="e_disposition">Disrupted</data>
638
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
639
+ </edge>
640
+ <edge id="e32" source="HOST-15295" target="52ed76a2-eb83-11ec-a779-b361cd3361fc">
641
+ <data key="e_type">INCIDENT_LINK</data>
642
+ <data key="e_timestamp">1665146419</data>
643
+ <data key="e_label_binary">malicious</data>
644
+ <data key="e_label_confidence">0.980224609375</data>
645
+ <data key="e_suspicion_score">0.980224609375</data>
646
+ <data key="e_mo_name">Data Theft</data>
647
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
648
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
649
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
650
+ <data key="e_lifecycle_stage">complete-mission</data>
651
+ <data key="e_disposition">Disrupted</data>
652
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
653
+ </edge>
654
+ <edge id="e33" source="HOST-15295" target="c146f0b2-4577-11ed-9958-ef6d5986f341">
655
+ <data key="e_type">INCIDENT_LINK</data>
656
+ <data key="e_timestamp">1665146419</data>
657
+ <data key="e_label_binary">malicious</data>
658
+ <data key="e_label_confidence">0.980224609375</data>
659
+ <data key="e_suspicion_score">0.980224609375</data>
660
+ <data key="e_mo_name">Data Theft</data>
661
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
662
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
663
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
664
+ <data key="e_lifecycle_stage">complete-mission</data>
665
+ <data key="e_disposition">Disrupted</data>
666
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
667
+ </edge>
668
+ <edge id="e34" source="c146f0b2-4577-11ed-9958-ef6d5986f341" target="HOST-15295">
669
+ <data key="e_type">INCIDENT_LINK</data>
670
+ <data key="e_timestamp">1665146419</data>
671
+ <data key="e_label_binary">malicious</data>
672
+ <data key="e_label_confidence">0.980224609375</data>
673
+ <data key="e_suspicion_score">0.980224609375</data>
674
+ <data key="e_mo_name">Data Theft</data>
675
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
676
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
677
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
678
+ <data key="e_lifecycle_stage">complete-mission</data>
679
+ <data key="e_disposition">Disrupted</data>
680
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
681
+ </edge>
682
+ <edge id="e35" source="d0106a81-0ffe-11ed-830c-619e68b7982f" target="HOST-15295">
683
+ <data key="e_type">INCIDENT_LINK</data>
684
+ <data key="e_timestamp">1665146419</data>
685
+ <data key="e_label_binary">malicious</data>
686
+ <data key="e_label_confidence">0.980224609375</data>
687
+ <data key="e_suspicion_score">0.980224609375</data>
688
+ <data key="e_mo_name">Data Theft</data>
689
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
690
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
691
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
692
+ <data key="e_lifecycle_stage">complete-mission</data>
693
+ <data key="e_disposition">Disrupted</data>
694
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
695
+ </edge>
696
+ <edge id="e36" source="HOST-15295" target="d0106a81-0ffe-11ed-830c-619e68b7982f">
697
+ <data key="e_type">INCIDENT_LINK</data>
698
+ <data key="e_timestamp">1665146419</data>
699
+ <data key="e_label_binary">malicious</data>
700
+ <data key="e_label_confidence">0.980224609375</data>
701
+ <data key="e_suspicion_score">0.980224609375</data>
702
+ <data key="e_mo_name">Data Theft</data>
703
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
704
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
705
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
706
+ <data key="e_lifecycle_stage">complete-mission</data>
707
+ <data key="e_disposition">Disrupted</data>
708
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
709
+ </edge>
710
+ <edge id="e37" source="HOST-13901" target="HOST-15295">
711
+ <data key="e_type">INCIDENT_LINK</data>
712
+ <data key="e_timestamp">1665146419</data>
713
+ <data key="e_label_binary">malicious</data>
714
+ <data key="e_label_confidence">0.980224609375</data>
715
+ <data key="e_suspicion_score">0.980224609375</data>
716
+ <data key="e_mo_name">Data Theft</data>
717
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
718
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
719
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
720
+ <data key="e_lifecycle_stage">complete-mission</data>
721
+ <data key="e_disposition">Disrupted</data>
722
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
723
+ </edge>
724
+ <edge id="e38" source="HOST-15295" target="HOST-13901">
725
+ <data key="e_type">INCIDENT_LINK</data>
726
+ <data key="e_timestamp">1665146419</data>
727
+ <data key="e_label_binary">malicious</data>
728
+ <data key="e_label_confidence">0.980224609375</data>
729
+ <data key="e_suspicion_score">0.980224609375</data>
730
+ <data key="e_mo_name">Data Theft</data>
731
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
732
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
733
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
734
+ <data key="e_lifecycle_stage">complete-mission</data>
735
+ <data key="e_disposition">Disrupted</data>
736
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
737
+ </edge>
738
+ <edge id="e39" source="201ee131-44fe-11ed-aef1-43fac206239a" target="26a1e781-4631-11ed-bdce-c529ac673098">
739
+ <data key="e_type">INCIDENT_LINK</data>
740
+ <data key="e_timestamp">1665146419</data>
741
+ <data key="e_label_binary">malicious</data>
742
+ <data key="e_label_confidence">0.980224609375</data>
743
+ <data key="e_suspicion_score">0.980224609375</data>
744
+ <data key="e_mo_name">Data Theft</data>
745
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
746
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
747
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
748
+ <data key="e_lifecycle_stage">complete-mission</data>
749
+ <data key="e_disposition">Disrupted</data>
750
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
751
+ </edge>
752
+ <edge id="e40" source="26a1e781-4631-11ed-bdce-c529ac673098" target="201ee131-44fe-11ed-aef1-43fac206239a">
753
+ <data key="e_type">INCIDENT_LINK</data>
754
+ <data key="e_timestamp">1665146419</data>
755
+ <data key="e_label_binary">malicious</data>
756
+ <data key="e_label_confidence">0.980224609375</data>
757
+ <data key="e_suspicion_score">0.980224609375</data>
758
+ <data key="e_mo_name">Data Theft</data>
759
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
760
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
761
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target","Suspicious User"]</data>
762
+ <data key="e_lifecycle_stage">complete-mission</data>
763
+ <data key="e_disposition">Disrupted</data>
764
+ <data key="e_incident_id">33cf81e0-463d-11ed-9048-e52ef683aaf1</data>
765
+ </edge>
766
+ </graph>
767
+ </graphml>
graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="17c16940-25f5-11ed-890a-458691bc1828">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.83.75</data>
35
+ <data key="n_hostname">100.64.83.75</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.578125</data>
38
+ <data key="n_products">["Precinct","Meraki"]</data>
39
+ </node>
40
+ <node id="e35e5350-ea91-11ec-90c7-eff83c975df3">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.75.177</data>
43
+ <data key="n_hostname">100.64.75.177</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <edge id="e1" source="17c16940-25f5-11ed-890a-458691bc1828" target="HOST-14486">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661661053</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">33e12990-268a-11ed-ad3b-a34fab330a0e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="57a92660-0669-11ee-a8ac-bb5c5fd6d88d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.53.7</data>
43
+ <data key="n_hostname">100.64.53.7</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="HOST-9151">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1691339707</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">33e767a0-3477-11ee-95f5-05a30bfe2201</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="e35e5350-ea91-11ec-90c7-eff83c975df3">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.75.177</data>
35
+ <data key="n_hostname">100.64.75.177</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="17c16940-25f5-11ed-890a-458691bc1828">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.83.75</data>
43
+ <data key="n_hostname">100.64.83.75</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","Meraki"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-14486" target="HOST-16699">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1661661053</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">33e918d0-268a-11ed-ad3b-a34fab330a0e</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="00aa1332-c823-11ed-b38f-718276329dbf">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.78.41</data>
35
+ <data key="n_hostname">172.31.78.41</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="fc7526c0-fc51-11ed-8bed-91ec48dd3b46">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.20.183</data>
43
+ <data key="n_hostname">100.64.20.183</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-3147" target="HOST-4554">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685210359</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">33ef0d80-fcb8-11ed-bdca-e96ab691d6d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="f05cce81-08de-11ee-bc95-2104c292fef1">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.50.131</data>
35
+ <data key="n_hostname">100.64.50.131</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.4375</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.16.233.43</data>
43
+ <data key="n_hostname">172.16.233.43</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-8784" target="HOST-2758">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688462508</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">340e67a0-1a4c-11ee-a525-9fcef38978a9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="978de6e0-c833-11ed-a4fe-3d0b452fa15b">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.4.90</data>
35
+ <data key="n_hostname">100.64.4.90</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="3ef81652-c823-11ed-a57f-1bec2f3cbc08">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.229.11</data>
43
+ <data key="n_hostname">172.30.229.11</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2990" target="HOST-4069">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685210359</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">34192ac0-fcb8-11ed-bdca-e96ab691d6d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f3-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.174.172</data>
35
+ <data key="n_hostname">172.30.174.172</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="89303efc-cf39-11ee-975b-09656ff07e0d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.89</data>
43
+ <data key="n_hostname">100.64.52.89</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2946" target="89303efc-cf39-11ee-975b-09656ff07e0d">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355938</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">341fdbe0-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="23ad2de5-0626-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.16.233.43</data>
35
+ <data key="n_hostname">172.16.233.43</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="f05cce81-08de-11ee-bc95-2104c292fef1">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.50.131</data>
43
+ <data key="n_hostname">100.64.50.131</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2758" target="HOST-8784">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1688462509</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">34265c70-1a4c-11ee-a525-9fcef38978a9</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2d2acb82-0625-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.31.78.41</data>
35
+ <data key="n_hostname">172.31.78.41</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8d21ef31-0f91-11ee-a05e-4972c5c5e0fd">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.19.73</data>
43
+ <data key="n_hostname">100.64.19.73</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2807" target="HOST-4369">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355938</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">342e5ad0-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="822098e2-06ac-11ee-9059-e3de73153c23">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.28.229</data>
35
+ <data key="n_hostname">100.64.28.229</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="8545d9b3-0628-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.29.1.127</data>
43
+ <data key="n_hostname">172.29.1.127</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="822098e2-06ac-11ee-9059-e3de73153c23" target="HOST-2713">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1692748457</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">3433af70-4147-11ee-a087-e963abb87ef5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml ADDED
@@ -0,0 +1,185 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="fb0efc80-0885-11ee-b69c-6bc3b36c2227">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.29.13</data>
35
+ <data key="n_hostname">100.64.29.13</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
39
+ </node>
40
+ <node id="40398a91-062a-11ee-bad6-6b745eaaac20">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.73.249</data>
43
+ <data key="n_hostname">100.64.73.249</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
47
+ </node>
48
+ <node id="4039d8b1-062a-11ee-bad6-6b745eaaac20">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.72.52</data>
51
+ <data key="n_hostname">100.64.72.52</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","Meraki","Umbrella"]</data>
55
+ </node>
56
+ <node id="8c9efb92-0625-11ee-a8f9-fdb12cb0dc3e">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.77.36</data>
59
+ <data key="n_hostname">100.64.77.36</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","Meraki"]</data>
63
+ </node>
64
+ <node id="ecaf12f2-0624-11ee-bad6-6b745eaaac20">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.13.181</data>
67
+ <data key="n_hostname">100.64.13.181</data>
68
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
69
+ <data key="n_suspicion_score">0.7890625</data>
70
+ <data key="n_products">["Precinct","Meraki"]</data>
71
+ </node>
72
+ <edge id="e1" source="fb0efc80-0885-11ee-b69c-6bc3b36c2227" target="HOST-13425">
73
+ <data key="e_type">INCIDENT_LINK</data>
74
+ <data key="e_timestamp">1689001957</data>
75
+ <data key="e_label_binary">malicious</data>
76
+ <data key="e_label_confidence">0.7890625</data>
77
+ <data key="e_suspicion_score">0.7890625</data>
78
+ <data key="e_mo_name">Data Theft</data>
79
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
80
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
81
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
82
+ <data key="e_lifecycle_stage">complete-mission</data>
83
+ <data key="e_disposition">Disrupted</data>
84
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
85
+ </edge>
86
+ <edge id="e2" source="HOST-13425" target="fb0efc80-0885-11ee-b69c-6bc3b36c2227">
87
+ <data key="e_type">INCIDENT_LINK</data>
88
+ <data key="e_timestamp">1689001957</data>
89
+ <data key="e_label_binary">malicious</data>
90
+ <data key="e_label_confidence">0.7890625</data>
91
+ <data key="e_suspicion_score">0.7890625</data>
92
+ <data key="e_mo_name">Data Theft</data>
93
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
94
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
95
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
96
+ <data key="e_lifecycle_stage">complete-mission</data>
97
+ <data key="e_disposition">Disrupted</data>
98
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
99
+ </edge>
100
+ <edge id="e3" source="HOST-12890" target="fb0efc80-0885-11ee-b69c-6bc3b36c2227">
101
+ <data key="e_type">INCIDENT_LINK</data>
102
+ <data key="e_timestamp">1689001957</data>
103
+ <data key="e_label_binary">malicious</data>
104
+ <data key="e_label_confidence">0.7890625</data>
105
+ <data key="e_suspicion_score">0.7890625</data>
106
+ <data key="e_mo_name">Data Theft</data>
107
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
108
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
109
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
110
+ <data key="e_lifecycle_stage">complete-mission</data>
111
+ <data key="e_disposition">Disrupted</data>
112
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
113
+ </edge>
114
+ <edge id="e4" source="fb0efc80-0885-11ee-b69c-6bc3b36c2227" target="HOST-12890">
115
+ <data key="e_type">INCIDENT_LINK</data>
116
+ <data key="e_timestamp">1689001957</data>
117
+ <data key="e_label_binary">malicious</data>
118
+ <data key="e_label_confidence">0.7890625</data>
119
+ <data key="e_suspicion_score">0.7890625</data>
120
+ <data key="e_mo_name">Data Theft</data>
121
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
122
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
123
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
124
+ <data key="e_lifecycle_stage">complete-mission</data>
125
+ <data key="e_disposition">Disrupted</data>
126
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
127
+ </edge>
128
+ <edge id="e5" source="8c9efb92-0625-11ee-a8f9-fdb12cb0dc3e" target="HOST-13425">
129
+ <data key="e_type">INCIDENT_LINK</data>
130
+ <data key="e_timestamp">1689001957</data>
131
+ <data key="e_label_binary">malicious</data>
132
+ <data key="e_label_confidence">0.7890625</data>
133
+ <data key="e_suspicion_score">0.7890625</data>
134
+ <data key="e_mo_name">Data Theft</data>
135
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
136
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
137
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
138
+ <data key="e_lifecycle_stage">complete-mission</data>
139
+ <data key="e_disposition">Disrupted</data>
140
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
141
+ </edge>
142
+ <edge id="e6" source="HOST-13425" target="8c9efb92-0625-11ee-a8f9-fdb12cb0dc3e">
143
+ <data key="e_type">INCIDENT_LINK</data>
144
+ <data key="e_timestamp">1689001957</data>
145
+ <data key="e_label_binary">malicious</data>
146
+ <data key="e_label_confidence">0.7890625</data>
147
+ <data key="e_suspicion_score">0.7890625</data>
148
+ <data key="e_mo_name">Data Theft</data>
149
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
150
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
151
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
152
+ <data key="e_lifecycle_stage">complete-mission</data>
153
+ <data key="e_disposition">Disrupted</data>
154
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
155
+ </edge>
156
+ <edge id="e7" source="ecaf12f2-0624-11ee-bad6-6b745eaaac20" target="HOST-13425">
157
+ <data key="e_type">INCIDENT_LINK</data>
158
+ <data key="e_timestamp">1689001957</data>
159
+ <data key="e_label_binary">malicious</data>
160
+ <data key="e_label_confidence">0.7890625</data>
161
+ <data key="e_suspicion_score">0.7890625</data>
162
+ <data key="e_mo_name">Data Theft</data>
163
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
164
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
165
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
166
+ <data key="e_lifecycle_stage">complete-mission</data>
167
+ <data key="e_disposition">Disrupted</data>
168
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
169
+ </edge>
170
+ <edge id="e8" source="HOST-13425" target="ecaf12f2-0624-11ee-bad6-6b745eaaac20">
171
+ <data key="e_type">INCIDENT_LINK</data>
172
+ <data key="e_timestamp">1689001957</data>
173
+ <data key="e_label_binary">malicious</data>
174
+ <data key="e_label_confidence">0.7890625</data>
175
+ <data key="e_suspicion_score">0.7890625</data>
176
+ <data key="e_mo_name">Data Theft</data>
177
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
178
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
179
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
180
+ <data key="e_lifecycle_stage">complete-mission</data>
181
+ <data key="e_disposition">Disrupted</data>
182
+ <data key="e_incident_id">343d7f30-1f34-11ee-bd83-b52c9cbf0232</data>
183
+ </edge>
184
+ </graph>
185
+ </graphml>
graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="260096f4-062a-11ee-94f6-0d301f382bbb">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">10.135.251.191</data>
35
+ <data key="n_hostname">10.135.251.191</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="fac2cce0-cf39-11ee-90df-39cf44f7aee2">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.22.134</data>
43
+ <data key="n_hostname">100.64.22.134</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2751" target="fac2cce0-cf39-11ee-90df-39cf44f7aee2">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355938</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">343e6060-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="3ef81652-c823-11ed-a57f-1bec2f3cbc08">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.229.11</data>
35
+ <data key="n_hostname">172.30.229.11</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="978de6e0-c833-11ed-a4fe-3d0b452fa15b">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.4.90</data>
43
+ <data key="n_hostname">100.64.4.90</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.9746875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-4069" target="HOST-2990">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1685210360</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.9746875</data>
53
+ <data key="e_suspicion_score">0.9746875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">344591f0-fcb8-11ed-bdca-e96ab691d6d5</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="dcc7f834-bc12-11ee-9bc5-23a3abdf621f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.73</data>
35
+ <data key="n_hostname">100.64.26.73</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.24.247.113</data>
43
+ <data key="n_hostname">172.24.247.113</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.214.148</data>
51
+ <data key="n_hostname">172.30.214.148</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.25</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="dcc7f834-bc12-11ee-9bc5-23a3abdf621f" target="HOST-2759">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1710288674</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.25</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Unprocessed</data>
68
+ <data key="e_incident_id">34575ed0-e0ce-11ee-bf77-99d8dd776972</data>
69
+ </edge>
70
+ <edge id="e2" source="dcc7f834-bc12-11ee-9bc5-23a3abdf621f" target="HOST-2720">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1710288674</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.25</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Unprocessed</data>
82
+ <data key="e_incident_id">34575ed0-e0ce-11ee-bf77-99d8dd776972</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="da6b6e40-062e-11ee-9e70-7d7711d897d8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.247.113</data>
35
+ <data key="n_hostname">172.24.247.113</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="dcc7f834-bc12-11ee-9bc5-23a3abdf621f">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.26.73</data>
43
+ <data key="n_hostname">100.64.26.73</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2759" target="HOST-5346">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288674</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">346b34f0-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d85c2bc7-3c89-11ef-b8f7-9b325ea6eec6">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.44.235</data>
35
+ <data key="n_hostname">100.64.44.235</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="63ea3781-28f4-11ef-9f0c-69e5e9251182">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.27.202.53</data>
43
+ <data key="n_hostname">172.27.202.53</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d85c2bc7-3c89-11ef-b8f7-9b325ea6eec6" target="HOST-5316">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1720645558</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">34766920-3f00-11ef-a3c1-8be1e2d87500</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,85 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a7221790-0625-11ee-a48a-ff0b3de2e266">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.8.4</data>
35
+ <data key="n_hostname">100.64.8.4</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.30.208.219</data>
43
+ <data key="n_hostname">172.30.208.219</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.71875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">172.30.168.48</data>
51
+ <data key="n_hostname">172.30.168.48</data>
52
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.71875</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-2831" target="HOST-2823">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1710288674</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7890625</data>
61
+ <data key="e_suspicion_score">0.7890625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">347a7730-e0ce-11ee-bf77-99d8dd776972</data>
69
+ </edge>
70
+ <edge id="e2" source="HOST-2831" target="HOST-2842">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1710288674</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7890625</data>
75
+ <data key="e_suspicion_score">0.7890625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">347a7730-e0ce-11ee-bf77-99d8dd776972</data>
83
+ </edge>
84
+ </graph>
85
+ </graphml>
graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="a6baf154-0625-11ee-bea9-5f52a09eb73a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.214.148</data>
35
+ <data key="n_hostname">172.30.214.148</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2f2dd652-cf3a-11ee-bdec-23587c756271">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.24.67</data>
43
+ <data key="n_hostname">100.64.24.67</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2720" target="2f2dd652-cf3a-11ee-bdec-23587c756271">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355939</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">348a0f60-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b3bc1064-0624-11ee-b173-c9921719c2f8">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.208.219</data>
35
+ <data key="n_hostname">172.30.208.219</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a7221790-0625-11ee-a48a-ff0b3de2e266">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.4</data>
43
+ <data key="n_hostname">100.64.8.4</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2823" target="HOST-2831">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288674</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">348d3be0-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml ADDED
@@ -0,0 +1,221 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="edc352b2-2ef9-11ef-b7f3-1b727180e89d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.53.57</data>
35
+ <data key="n_hostname">100.64.53.57</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.7890625</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a95bc630-28f4-11ef-9f0c-69e5e9251182">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.23.168.229</data>
43
+ <data key="n_hostname">172.23.168.229</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <node id="b06f06f0-2efb-11ef-9440-75466bd8809c">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.53.58</data>
51
+ <data key="n_hostname">100.64.53.58</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.578125</data>
54
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
55
+ </node>
56
+ <node id="8a3d5680-28fc-11ef-a845-d59d1ff36f8b">
57
+ <data key="n_type">HOST</data>
58
+ <data key="n_ip">100.64.53.59</data>
59
+ <data key="n_hostname">100.64.53.59</data>
60
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
61
+ <data key="n_suspicion_score">0.71875</data>
62
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
63
+ </node>
64
+ <node id="ecc3b6c0-2fda-11ef-8743-579eb6e1cb6e">
65
+ <data key="n_type">HOST</data>
66
+ <data key="n_ip">100.64.20.138</data>
67
+ <data key="n_hostname">100.64.20.138</data>
68
+ <data key="n_set_roles">["Exploiting Host"]</data>
69
+ <data key="n_suspicion_score">0.578125</data>
70
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
71
+ </node>
72
+ <node id="2e59cb76-28f5-11ef-8290-3bb54315301d">
73
+ <data key="n_type">HOST</data>
74
+ <data key="n_ip">100.64.22.172</data>
75
+ <data key="n_hostname">100.64.22.172</data>
76
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
77
+ <data key="n_suspicion_score">0.71875</data>
78
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
79
+ </node>
80
+ <edge id="e1" source="edc352b2-2ef9-11ef-b7f3-1b727180e89d" target="HOST-3829">
81
+ <data key="e_type">INCIDENT_LINK</data>
82
+ <data key="e_timestamp">1719098082</data>
83
+ <data key="e_label_binary">malicious</data>
84
+ <data key="e_label_confidence">0.7890625</data>
85
+ <data key="e_suspicion_score">0.7890625</data>
86
+ <data key="e_mo_name">Data Theft</data>
87
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
88
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
89
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
90
+ <data key="e_lifecycle_stage">complete-mission</data>
91
+ <data key="e_disposition">Disrupted</data>
92
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
93
+ </edge>
94
+ <edge id="e2" source="HOST-3829" target="edc352b2-2ef9-11ef-b7f3-1b727180e89d">
95
+ <data key="e_type">INCIDENT_LINK</data>
96
+ <data key="e_timestamp">1719098082</data>
97
+ <data key="e_label_binary">malicious</data>
98
+ <data key="e_label_confidence">0.7890625</data>
99
+ <data key="e_suspicion_score">0.7890625</data>
100
+ <data key="e_mo_name">Data Theft</data>
101
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
102
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
103
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
104
+ <data key="e_lifecycle_stage">complete-mission</data>
105
+ <data key="e_disposition">Disrupted</data>
106
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
107
+ </edge>
108
+ <edge id="e3" source="b06f06f0-2efb-11ef-9440-75466bd8809c" target="HOST-3829">
109
+ <data key="e_type">INCIDENT_LINK</data>
110
+ <data key="e_timestamp">1719098082</data>
111
+ <data key="e_label_binary">malicious</data>
112
+ <data key="e_label_confidence">0.7890625</data>
113
+ <data key="e_suspicion_score">0.7890625</data>
114
+ <data key="e_mo_name">Data Theft</data>
115
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
116
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
117
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
118
+ <data key="e_lifecycle_stage">complete-mission</data>
119
+ <data key="e_disposition">Disrupted</data>
120
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
121
+ </edge>
122
+ <edge id="e4" source="HOST-3829" target="b06f06f0-2efb-11ef-9440-75466bd8809c">
123
+ <data key="e_type">INCIDENT_LINK</data>
124
+ <data key="e_timestamp">1719098082</data>
125
+ <data key="e_label_binary">malicious</data>
126
+ <data key="e_label_confidence">0.7890625</data>
127
+ <data key="e_suspicion_score">0.7890625</data>
128
+ <data key="e_mo_name">Data Theft</data>
129
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
130
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
131
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
132
+ <data key="e_lifecycle_stage">complete-mission</data>
133
+ <data key="e_disposition">Disrupted</data>
134
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
135
+ </edge>
136
+ <edge id="e5" source="8a3d5680-28fc-11ef-a845-d59d1ff36f8b" target="HOST-3829">
137
+ <data key="e_type">INCIDENT_LINK</data>
138
+ <data key="e_timestamp">1719098082</data>
139
+ <data key="e_label_binary">malicious</data>
140
+ <data key="e_label_confidence">0.7890625</data>
141
+ <data key="e_suspicion_score">0.7890625</data>
142
+ <data key="e_mo_name">Data Theft</data>
143
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
144
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
145
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
146
+ <data key="e_lifecycle_stage">complete-mission</data>
147
+ <data key="e_disposition">Disrupted</data>
148
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
149
+ </edge>
150
+ <edge id="e6" source="HOST-3829" target="8a3d5680-28fc-11ef-a845-d59d1ff36f8b">
151
+ <data key="e_type">INCIDENT_LINK</data>
152
+ <data key="e_timestamp">1719098082</data>
153
+ <data key="e_label_binary">malicious</data>
154
+ <data key="e_label_confidence">0.7890625</data>
155
+ <data key="e_suspicion_score">0.7890625</data>
156
+ <data key="e_mo_name">Data Theft</data>
157
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
158
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
159
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
160
+ <data key="e_lifecycle_stage">complete-mission</data>
161
+ <data key="e_disposition">Disrupted</data>
162
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
163
+ </edge>
164
+ <edge id="e7" source="ecc3b6c0-2fda-11ef-8743-579eb6e1cb6e" target="HOST-3829">
165
+ <data key="e_type">INCIDENT_LINK</data>
166
+ <data key="e_timestamp">1719098082</data>
167
+ <data key="e_label_binary">malicious</data>
168
+ <data key="e_label_confidence">0.7890625</data>
169
+ <data key="e_suspicion_score">0.7890625</data>
170
+ <data key="e_mo_name">Data Theft</data>
171
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
172
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
173
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
174
+ <data key="e_lifecycle_stage">complete-mission</data>
175
+ <data key="e_disposition">Disrupted</data>
176
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
177
+ </edge>
178
+ <edge id="e8" source="HOST-3829" target="ecc3b6c0-2fda-11ef-8743-579eb6e1cb6e">
179
+ <data key="e_type">INCIDENT_LINK</data>
180
+ <data key="e_timestamp">1719098082</data>
181
+ <data key="e_label_binary">malicious</data>
182
+ <data key="e_label_confidence">0.7890625</data>
183
+ <data key="e_suspicion_score">0.7890625</data>
184
+ <data key="e_mo_name">Data Theft</data>
185
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
186
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
187
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
188
+ <data key="e_lifecycle_stage">complete-mission</data>
189
+ <data key="e_disposition">Disrupted</data>
190
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
191
+ </edge>
192
+ <edge id="e9" source="2e59cb76-28f5-11ef-8290-3bb54315301d" target="HOST-3829">
193
+ <data key="e_type">INCIDENT_LINK</data>
194
+ <data key="e_timestamp">1719098082</data>
195
+ <data key="e_label_binary">malicious</data>
196
+ <data key="e_label_confidence">0.7890625</data>
197
+ <data key="e_suspicion_score">0.7890625</data>
198
+ <data key="e_mo_name">Data Theft</data>
199
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
200
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
201
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
202
+ <data key="e_lifecycle_stage">complete-mission</data>
203
+ <data key="e_disposition">Disrupted</data>
204
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
205
+ </edge>
206
+ <edge id="e10" source="HOST-3829" target="2e59cb76-28f5-11ef-8290-3bb54315301d">
207
+ <data key="e_type">INCIDENT_LINK</data>
208
+ <data key="e_timestamp">1719098082</data>
209
+ <data key="e_label_binary">malicious</data>
210
+ <data key="e_label_confidence">0.7890625</data>
211
+ <data key="e_suspicion_score">0.7890625</data>
212
+ <data key="e_mo_name">Data Theft</data>
213
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
214
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
215
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
216
+ <data key="e_lifecycle_stage">complete-mission</data>
217
+ <data key="e_disposition">Disrupted</data>
218
+ <data key="e_incident_id">3496dfa0-30ed-11ef-bae8-75e6361c756f</data>
219
+ </edge>
220
+ </graph>
221
+ </graphml>
graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="89303efc-cf39-11ee-975b-09656ff07e0d">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.52.89</data>
35
+ <data key="n_hostname">100.64.52.89</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-9287" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355939</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">34972ec0-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="2bd30e40-0626-11ee-b19f-ed665a42340f">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.30.168.48</data>
35
+ <data key="n_hostname">172.30.168.48</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="a7221790-0625-11ee-a48a-ff0b3de2e266">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.8.4</data>
43
+ <data key="n_hostname">100.64.8.4</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.7890625</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2842" target="HOST-2831">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288674</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7890625</data>
53
+ <data key="e_suspicion_score">0.7890625</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">34a18730-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.38.152</data>
35
+ <data key="n_hostname">172.18.38.152</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="89303efc-cf39-11ee-975b-09656ff07e0d">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.52.89</data>
43
+ <data key="n_hostname">100.64.52.89</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.578125</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2844" target="HOST-9287">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355939</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">34a42710-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bc4b2-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.24.217.8</data>
35
+ <data key="n_hostname">172.24.217.8</data>
36
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="2e78f661-0625-11ee-a510-47d18ec77e75">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.26.223</data>
43
+ <data key="n_hostname">100.64.26.223</data>
44
+ <data key="n_set_roles">["Exploiting Host","Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.9746875</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2731" target="HOST-5422">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1708355939</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.9746875</data>
53
+ <data key="e_suspicion_score">0.9746875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">34aed570-cf3a-11ee-a605-7bbb1d17de1b</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml ADDED
@@ -0,0 +1,77 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="33582368-9f48-11ee-bd85-25f6be2d5e68">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.69.9</data>
35
+ <data key="n_hostname">100.64.69.9</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="770711ea-0626-11ee-9f36-61ae8743c399">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.68.9</data>
43
+ <data key="n_hostname">100.64.68.9</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]</data>
47
+ </node>
48
+ <edge id="e1" source="33582368-9f48-11ee-bd85-25f6be2d5e68" target="HOST-11383">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1703084296</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">34b25c30-9f48-11ee-b79d-9f7e35646416</data>
61
+ </edge>
62
+ <edge id="e2" source="HOST-11383" target="33582368-9f48-11ee-bd85-25f6be2d5e68">
63
+ <data key="e_type">INCIDENT_LINK</data>
64
+ <data key="e_timestamp">1703084296</data>
65
+ <data key="e_label_binary">malicious</data>
66
+ <data key="e_label_confidence">0.7</data>
67
+ <data key="e_suspicion_score">0.25</data>
68
+ <data key="e_mo_name">Data Theft</data>
69
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
70
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
71
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
72
+ <data key="e_lifecycle_stage">complete-mission</data>
73
+ <data key="e_disposition">Unprocessed</data>
74
+ <data key="e_incident_id">34b25c30-9f48-11ee-b79d-9f7e35646416</data>
75
+ </edge>
76
+ </graph>
77
+ </graphml>
graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="d25a0d80-e0ba-11ee-8af7-93088bdfcf9a">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.26.75</data>
35
+ <data key="n_hostname">100.64.26.75</data>
36
+ <data key="n_set_roles">["Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.25</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">172.18.38.152</data>
43
+ <data key="n_hostname">172.18.38.152</data>
44
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.25</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="d25a0d80-e0ba-11ee-8af7-93088bdfcf9a" target="HOST-2844">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288674</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.7</data>
53
+ <data key="e_suspicion_score">0.25</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Host","Exploiting Target"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Unprocessed</data>
60
+ <data key="e_incident_id">34ce3c80-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>
graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml ADDED
@@ -0,0 +1,113 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="c9c2af8d-0625-11ee-9f36-61ae8743c399">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">100.64.68.23</data>
35
+ <data key="n_hostname">100.64.68.23</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.6625</data>
38
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
39
+ </node>
40
+ <node id="c97e5dd0-0936-11ee-8624-55aeb0b2b3db">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.69.182</data>
43
+ <data key="n_hostname">100.64.69.182</data>
44
+ <data key="n_set_roles">["Exploiting Target"]</data>
45
+ <data key="n_suspicion_score">0.49375</data>
46
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
47
+ </node>
48
+ <node id="ef1cdea0-0624-11ee-bb59-61e1854d46e6">
49
+ <data key="n_type">HOST</data>
50
+ <data key="n_ip">100.64.14.163</data>
51
+ <data key="n_hostname">100.64.14.163</data>
52
+ <data key="n_set_roles">["Exploiting Host"]</data>
53
+ <data key="n_suspicion_score">0.49375</data>
54
+ <data key="n_products">["Precinct","PAN NGFW"]</data>
55
+ </node>
56
+ <edge id="e1" source="HOST-11393" target="c97e5dd0-0936-11ee-8624-55aeb0b2b3db">
57
+ <data key="e_type">INCIDENT_LINK</data>
58
+ <data key="e_timestamp">1686614815</data>
59
+ <data key="e_label_binary">malicious</data>
60
+ <data key="e_label_confidence">0.7</data>
61
+ <data key="e_suspicion_score">0.6625</data>
62
+ <data key="e_mo_name">Data Theft</data>
63
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
64
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
65
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
66
+ <data key="e_lifecycle_stage">complete-mission</data>
67
+ <data key="e_disposition">Disrupted</data>
68
+ <data key="e_incident_id">34ddbb60-097e-11ee-8b37-9ba18759a170</data>
69
+ </edge>
70
+ <edge id="e2" source="c97e5dd0-0936-11ee-8624-55aeb0b2b3db" target="HOST-11393">
71
+ <data key="e_type">INCIDENT_LINK</data>
72
+ <data key="e_timestamp">1686614815</data>
73
+ <data key="e_label_binary">malicious</data>
74
+ <data key="e_label_confidence">0.7</data>
75
+ <data key="e_suspicion_score">0.6625</data>
76
+ <data key="e_mo_name">Data Theft</data>
77
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
78
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
79
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
80
+ <data key="e_lifecycle_stage">complete-mission</data>
81
+ <data key="e_disposition">Disrupted</data>
82
+ <data key="e_incident_id">34ddbb60-097e-11ee-8b37-9ba18759a170</data>
83
+ </edge>
84
+ <edge id="e3" source="HOST-12181" target="HOST-11393">
85
+ <data key="e_type">INCIDENT_LINK</data>
86
+ <data key="e_timestamp">1686614815</data>
87
+ <data key="e_label_binary">malicious</data>
88
+ <data key="e_label_confidence">0.7</data>
89
+ <data key="e_suspicion_score">0.6625</data>
90
+ <data key="e_mo_name">Data Theft</data>
91
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
92
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
93
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
94
+ <data key="e_lifecycle_stage">complete-mission</data>
95
+ <data key="e_disposition">Disrupted</data>
96
+ <data key="e_incident_id">34ddbb60-097e-11ee-8b37-9ba18759a170</data>
97
+ </edge>
98
+ <edge id="e4" source="HOST-11393" target="HOST-12181">
99
+ <data key="e_type">INCIDENT_LINK</data>
100
+ <data key="e_timestamp">1686614815</data>
101
+ <data key="e_label_binary">malicious</data>
102
+ <data key="e_label_confidence">0.7</data>
103
+ <data key="e_suspicion_score">0.6625</data>
104
+ <data key="e_mo_name">Data Theft</data>
105
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
106
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
107
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
108
+ <data key="e_lifecycle_stage">complete-mission</data>
109
+ <data key="e_disposition">Disrupted</data>
110
+ <data key="e_incident_id">34ddbb60-097e-11ee-8b37-9ba18759a170</data>
111
+ </edge>
112
+ </graph>
113
+ </graphml>
graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml ADDED
@@ -0,0 +1,63 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <graphml xmlns="http://graphml.graphdrawing.org/xmlns"
3
+ xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
4
+ xsi:schemaLocation="http://graphml.graphdrawing.org/xmlns http://graphml.graphdrawing.org/xmlns/1.0/graphml.xsd">
5
+ <key id="n_type" for="node" attr.name="type" attr.type="string"/>
6
+ <key id="n_ip" for="node" attr.name="ip" attr.type="string"/>
7
+ <key id="n_hostname" for="node" attr.name="hostname" attr.type="string"/>
8
+ <key id="n_credential" for="node" attr.name="credential" attr.type="string"/>
9
+ <key id="n_set_roles" for="node" attr.name="set_roles" attr.type="string"/>
10
+ <key id="n_suspicion_score" for="node" attr.name="suspicion_score" attr.type="double"/>
11
+ <key id="n_products" for="node" attr.name="products" attr.type="string"/>
12
+ <key id="n_report_text" for="node" attr.name="report_text" attr.type="string"/>
13
+ <key id="e_type" for="edge" attr.name="type" attr.type="string"/>
14
+ <key id="e_timestamp" for="edge" attr.name="timestamp" attr.type="double"/>
15
+ <key id="e_message_type" for="edge" attr.name="message_type" attr.type="string"/>
16
+ <key id="e_action" for="edge" attr.name="action" attr.type="string"/>
17
+ <key id="e_protocol" for="edge" attr.name="protocol" attr.type="string"/>
18
+ <key id="e_src_port" for="edge" attr.name="src_port" attr.type="string"/>
19
+ <key id="e_dst_port" for="edge" attr.name="dst_port" attr.type="string"/>
20
+ <key id="e_stream" for="edge" attr.name="stream" attr.type="string"/>
21
+ <key id="e_label_binary" for="edge" attr.name="label_binary" attr.type="string"/>
22
+ <key id="e_label_confidence" for="edge" attr.name="label_confidence" attr.type="double"/>
23
+ <key id="e_suspicion_score" for="edge" attr.name="suspicion_score" attr.type="double"/>
24
+ <key id="e_mo_name" for="edge" attr.name="mo_name" attr.type="string"/>
25
+ <key id="e_attack_techniques" for="edge" attr.name="attack_techniques" attr.type="string"/>
26
+ <key id="e_attack_tactics" for="edge" attr.name="attack_tactics" attr.type="string"/>
27
+ <key id="e_set_roles" for="edge" attr.name="set_roles" attr.type="string"/>
28
+ <key id="e_lifecycle_stage" for="edge" attr.name="lifecycle_stage" attr.type="string"/>
29
+ <key id="e_disposition" for="edge" attr.name="disposition" attr.type="string"/>
30
+ <key id="e_incident_id" for="edge" attr.name="incident_id" attr.type="string"/>
31
+ <graph id="G" edgedefault="directed">
32
+ <node id="b22bebc1-062a-11ee-9a0c-b9f8978d847e">
33
+ <data key="n_type">HOST</data>
34
+ <data key="n_ip">172.18.38.152</data>
35
+ <data key="n_hostname">172.18.38.152</data>
36
+ <data key="n_set_roles">["Exploiting Target","Exploiting Host"]</data>
37
+ <data key="n_suspicion_score">0.71875</data>
38
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
39
+ </node>
40
+ <node id="d25a0d80-e0ba-11ee-8af7-93088bdfcf9a">
41
+ <data key="n_type">HOST</data>
42
+ <data key="n_ip">100.64.26.75</data>
43
+ <data key="n_hostname">100.64.26.75</data>
44
+ <data key="n_set_roles">["Exploiting Host"]</data>
45
+ <data key="n_suspicion_score">0.4375</data>
46
+ <data key="n_products">["Precinct","ASA Firewall"]</data>
47
+ </node>
48
+ <edge id="e1" source="HOST-2844" target="HOST-5347">
49
+ <data key="e_type">INCIDENT_LINK</data>
50
+ <data key="e_timestamp">1710288675</data>
51
+ <data key="e_label_binary">malicious</data>
52
+ <data key="e_label_confidence">0.71875</data>
53
+ <data key="e_suspicion_score">0.71875</data>
54
+ <data key="e_mo_name">Data Theft</data>
55
+ <data key="e_attack_techniques">["T1190","T1041","T1567"]</data>
56
+ <data key="e_attack_tactics">["TA0001","TA0002","TA0009","TA0010"]</data>
57
+ <data key="e_set_roles">["Exploiting Target","Exploiting Host"]</data>
58
+ <data key="e_lifecycle_stage">complete-mission</data>
59
+ <data key="e_disposition">Disrupted</data>
60
+ <data key="e_incident_id">34e4aab0-e0ce-11ee-bf77-99d8dd776972</data>
61
+ </edge>
62
+ </graph>
63
+ </graphml>