diff --git a/graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..55c4403522cbabde19736fb9e168fd251067dd09
--- /dev/null
+++ b/graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.86.113
+ 100.64.86.113
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660536630
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 334e14f0-1c50-11ed-bd09-797a43d85ced
+
+
+
diff --git a/graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae26c6fd7c19f1247f2d05c24ed29d67e0585bc3
--- /dev/null
+++ b/graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.235
+ 100.64.53.235
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695920288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 335077a0-5e20-11ee-a8d3-61b0fc50a12d
+
+
+
diff --git a/graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17d1771a7eb05f019499b0e55fe8a35a30a77348
--- /dev/null
+++ b/graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.158
+ 100.64.81.158
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.126
+ 100.64.71.126
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.159
+ 100.64.81.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1665146418
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33537410-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146418
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33537410-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146418
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33537410-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146418
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33537410-463d-11ed-9048-e52ef683aaf1
+
+
+
diff --git a/graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c0995cfef2bfdc7fc9c3dd2152fbdb2070fab53
--- /dev/null
+++ b/graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.117
+ 100.64.86.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660536630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 33547d90-1c50-11ed-bd09-797a43d85ced
+
+
+
diff --git a/graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e888c36606a4aae31001d07bd14f215d50a71c42
--- /dev/null
+++ b/graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.227
+ 100.64.28.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692748455
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 335f2160-4147-11ee-a087-e963abb87ef5
+
+
+
diff --git a/graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..872e998f75c96906ce494ce5c7ceacfb982a7766
--- /dev/null
+++ b/graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.117
+ 100.64.86.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660536630
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 336100b0-1c50-11ed-bd09-797a43d85ced
+
+
+
diff --git a/graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2be651e1480362ef16cead09198b0432092518ce
--- /dev/null
+++ b/graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1660536630
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3365e2b0-1c50-11ed-bd09-797a43d85ced
+
+
+
diff --git a/graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a0eb7161d9b1493156f88eee2ef825e61c4f0958
--- /dev/null
+++ b/graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.193
+ 100.64.12.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698990331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3366b7b0-7a0c-11ee-9002-0de92ece484d
+
+
+
diff --git a/graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8b476931614bd20654932baad7bb3ad8b9ba74b3
--- /dev/null
+++ b/graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.7.252
+ 100.64.7.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1660536630
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3370b820-1c50-11ed-bd09-797a43d85ced
+
+
+
diff --git a/graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c0d28c8037d108a274db5ff6fb618711844c077
--- /dev/null
+++ b/graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.227
+ 100.64.28.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692748455
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3372f780-4147-11ee-a087-e963abb87ef5
+
+
+
diff --git a/graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92f9b60b392b44b3f8f4cba9c3b925e90f4614ed
--- /dev/null
+++ b/graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.213
+ 100.64.2.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.216
+ 100.64.71.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3374f730-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3374f730-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ef06a566dc3068b848496c3a1fbec81d0cfd61f
--- /dev/null
+++ b/graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.46
+ 100.64.80.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.147
+ 100.64.72.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 337529d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 337529d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2d8c7388e9f495fb3d246cb81c9b7c6943b5ce8
--- /dev/null
+++ b/graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.47
+ 100.64.80.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.47.45
+ 100.64.47.45
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.9905078125
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.48
+ 100.64.80.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.173
+ 100.64.72.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.49
+ 100.64.80.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.254
+ 100.64.9.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.157
+ 100.64.78.157
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324369
+ malicious
+ 0.9905078125
+ 0.9905078125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c3d1493434e01ea45e6257d3fb7bd205237336d
--- /dev/null
+++ b/graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.226
+ 100.64.1.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.209
+ 100.64.72.209
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.112
+ 100.64.76.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.113
+ 100.64.76.113
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.73
+ 100.64.72.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.114
+ 100.64.76.114
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.115
+ 100.64.76.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.56
+ HOST-13203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.45
+ 100.64.73.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.130
+ 100.64.72.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.116
+ 100.64.76.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.117
+ 100.64.76.117
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33839d30-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c14904775cb0ca295408d74c6490b3c94d9da86
--- /dev/null
+++ b/graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.118
+ 100.64.76.118
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.119
+ 100.64.76.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33863540-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33863540-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33863540-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685665
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33863540-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea433439a1b269ef6e7248eee623740b5ed11fc6
--- /dev/null
+++ b/graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.83.74
+ 100.64.83.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661661053
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 338e2790-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e32ca41142b8f63e2a093150131139143786e858
--- /dev/null
+++ b/graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288672
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 338edeb0-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22f466156b197379b45cfe08dec9ec6c8498c5d2
--- /dev/null
+++ b/graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.152
+ 100.64.76.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.181
+ 100.64.71.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.19.14
+ 100.64.19.14
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.153
+ 100.64.76.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.154
+ 100.64.76.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893688
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3390a1e0-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ceb0124681f3348e6bfad4c727e3b51a4ab45211
--- /dev/null
+++ b/graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.7
+ 100.64.53.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 339528f0-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbd72d01e447398ec39e6bff98c5c46ead798b2b
--- /dev/null
+++ b/graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.70
+ 100.64.13.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288673
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 33a6d380-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..132fe192e8b5c21f035d80832db57b9e03e0cc7f
--- /dev/null
+++ b/graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.183
+ 100.64.20.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685210359
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33c53e60-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3bc393aa8a141c615c202803c63fb128027068a
--- /dev/null
+++ b/graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml
@@ -0,0 +1,767 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.213
+ 100.64.75.213
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.75.181
+ 100.64.75.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.55.189
+ 100.64.55.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.160
+ 100.64.81.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.1.28
+ 100.64.1.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.980224609375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.7.250
+ 100.64.7.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.161
+ 100.64.81.161
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.162
+ 100.64.81.162
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 192.168.147.151
+ 192.168.147.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.947265625
+ ["Precinct","Meraki","Umbrella","Windows Active Directory","Cisco Meraki Firewall"]
+
+
+ CRED
+ CRED-0009
+ ["Suspicious User"]
+ 0.8125
+ ["Umbrella"]
+
+
+ HOST
+ 100.64.81.163
+ 100.64.81.163
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.105
+ 100.64.71.105
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.164
+ 100.64.81.164
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ HOST-16045
+ ["Exploiting Host","Exploiting Target"]
+ 0.947265625
+ ["Precinct","Umbrella","Meraki"]
+
+
+ CRED
+ CRED-0010
+ ["Suspicious User"]
+ 0.8125
+ ["Umbrella"]
+
+
+ HOST
+ 100.64.23.167
+ 100.64.23.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.160
+ 100.64.72.160
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.165
+ 100.64.81.165
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.166
+ 100.64.81.166
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.167
+ 100.64.81.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.168
+ 100.64.81.168
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.169
+ 100.64.81.169
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146419
+ malicious
+ 0.980224609375
+ 0.980224609375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Suspicious User"]
+ complete-mission
+ Disrupted
+ 33cf81e0-463d-11ed-9048-e52ef683aaf1
+
+
+
diff --git a/graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84df5ae261acaab77a2deff5bc1acd3512e4c25f
--- /dev/null
+++ b/graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.83.75
+ 100.64.83.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661661053
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 33e12990-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d53abe4f599c09c4895a4111515ddc50c2708ef2
--- /dev/null
+++ b/graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.7
+ 100.64.53.7
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339707
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 33e767a0-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fab4b20ac43f15109939dd68e631446f0260e5e0
--- /dev/null
+++ b/graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.177
+ 100.64.75.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.83.75
+ 100.64.83.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661661053
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 33e918d0-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57cc7754a0b794c6bfa9d12037423f4677111720
--- /dev/null
+++ b/graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.20.183
+ 100.64.20.183
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685210359
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 33ef0d80-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a80f82f13a0fee88a2070dfe8c3469c3d5309658
--- /dev/null
+++ b/graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.131
+ 100.64.50.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462508
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 340e67a0-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..acefb5d2cb7e102b7488e5a6dc27f636ac5e625b
--- /dev/null
+++ b/graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.90
+ 100.64.4.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685210359
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 34192ac0-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53e938106271aab9c6b798d8b9b0cdba16d853a3
--- /dev/null
+++ b/graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.89
+ 100.64.52.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 341fdbe0-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f12d6c9b20b1cb4e2875a8f15b2ebf089d8deace
--- /dev/null
+++ b/graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.131
+ 100.64.50.131
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462509
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34265c70-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92d8b052a426e3adebdf0d0827de8b1cc844501e
--- /dev/null
+++ b/graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.73
+ 100.64.19.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355938
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 342e5ad0-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..350dfc27c2b7ac73774033d135cf5a133b6ef320
--- /dev/null
+++ b/graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.229
+ 100.64.28.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692748457
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3433af70-4147-11ee-a087-e963abb87ef5
+
+
+
diff --git a/graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7521811c8fd3d58ef16d9714148913dff28d78f
--- /dev/null
+++ b/graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.13
+ 100.64.29.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.249
+ 100.64.73.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.36
+ 100.64.77.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.181
+ 100.64.13.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+ INCIDENT_LINK
+ 1689001957
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 343d7f30-1f34-11ee-bd83-b52c9cbf0232
+
+
+
diff --git a/graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92de22a2a7816d7af62356846f91ca6b00af9987
--- /dev/null
+++ b/graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.134
+ 100.64.22.134
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355938
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 343e6060-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd3a4e887c950b074bcbc5d61bad6a6fba980e25
--- /dev/null
+++ b/graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.4.90
+ 100.64.4.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685210360
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 344591f0-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e7e79e186a4b31ff1e47665b7200dbd21ec0afb1
--- /dev/null
+++ b/graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.73
+ 100.64.26.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34575ed0-e0ce-11ee-bf77-99d8dd776972
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34575ed0-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0b5027368cc5ed337d361421dc9ae952ecf7886
--- /dev/null
+++ b/graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.73
+ 100.64.26.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 346b34f0-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml b/graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cbd71e9468cdd4f6837ea0b56ee9d3de99fcc96
--- /dev/null
+++ b/graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.44.235
+ 100.64.44.235
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720645558
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34766920-3f00-11ef-a3c1-8be1e2d87500
+
+
+
diff --git a/graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9fa3e8784e492e21b33c1af1dabef8ae7b49105
--- /dev/null
+++ b/graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 347a7730-e0ce-11ee-bf77-99d8dd776972
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 347a7730-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8abf46dcd6a3127fb34102f4ee9ad7f7866a879a
--- /dev/null
+++ b/graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.67
+ 100.64.24.67
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355939
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 348a0f60-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6e752e903d252bcf9971fb5bb307382a0d2a472
--- /dev/null
+++ b/graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 348d3be0-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e5caec58d531170ed331b77d98cbd2c5c746934
--- /dev/null
+++ b/graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.57
+ 100.64.53.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.58
+ 100.64.53.58
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.59
+ 100.64.53.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.138
+ 100.64.20.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.172
+ 100.64.22.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098082
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3496dfa0-30ed-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a41483935436b29ad3efc9461031002fca29cab3
--- /dev/null
+++ b/graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.89
+ 100.64.52.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355939
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34972ec0-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7f916b5b760ad033aa45e6cb3ff7249253ab889
--- /dev/null
+++ b/graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.4
+ 100.64.8.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34a18730-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab3c705715efff9e976dd2a2eea9c25cbc3c57c0
--- /dev/null
+++ b/graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.89
+ 100.64.52.89
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355939
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34a42710-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e32ba4b840bfb8e441fab96a609815c460f4a42c
--- /dev/null
+++ b/graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.223
+ 100.64.26.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708355939
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 34aed570-cf3a-11ee-a605-7bbb1d17de1b
+
+
+
diff --git a/graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3276abd93e83e168a2d98d1334d5eb71931ccde7
--- /dev/null
+++ b/graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.9
+ 100.64.69.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1703084296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34b25c30-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34b25c30-9f48-11ee-b79d-9f7e35646416
+
+
+
diff --git a/graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3b725fd43d3f0c1bc60f50195db8a67c989b853
--- /dev/null
+++ b/graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.75
+ 100.64.26.75
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288674
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34ce3c80-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5101a9cd14f50a139cb0f566a89def4025973030
--- /dev/null
+++ b/graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.182
+ 100.64.69.182
+ ["Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.163
+ 100.64.14.163
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34ddbb60-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34ddbb60-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34ddbb60-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34ddbb60-097e-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da9aa7ae0805a6c3ca0cbc2e9718dd61c01847cf
--- /dev/null
+++ b/graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.75
+ 100.64.26.75
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710288675
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 34e4aab0-e0ce-11ee-bf77-99d8dd776972
+
+
+
diff --git a/graph/incidents_graphml/3/34fbfb60-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/34fbfb60-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d203b1e7f045d05a985019b909c3b7d7b68811b
--- /dev/null
+++ b/graph/incidents_graphml/3/34fbfb60-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.185
+ 100.64.52.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783545
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 34fbfb60-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/35051980-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/3/35051980-097e-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb6ea64a77a9c4eece8c7abdff6d82b22a8061b5
--- /dev/null
+++ b/graph/incidents_graphml/3/35051980-097e-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,473 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.187
+ 100.64.13.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.8
+ 100.64.68.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.25.129
+ 100.64.25.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.325
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.16.236
+ 100.64.16.236
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.8.21
+ 100.64.8.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.9.100
+ 100.64.9.100
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.24.248
+ 100.64.24.248
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.61
+ 100.64.12.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.325
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.325
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35051980-097e-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/3/350a7a50-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/350a7a50-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..088ec85adf99b1706d7543f02c6a6018f349f07a
--- /dev/null
+++ b/graph/incidents_graphml/3/350a7a50-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.185
+ 100.64.52.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783545
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 350a7a50-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/351ca350-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/351ca350-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8cc4c53a02ae489484e2d8a473a41b7c000ef580
--- /dev/null
+++ b/graph/incidents_graphml/3/351ca350-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.220
+ 100.64.4.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657204
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 351ca350-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/351dd870-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/3/351dd870-1329-11ef-aba1-33e212db0be8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cbf524a1f54c00d78bb57525712754998aabb2f
--- /dev/null
+++ b/graph/incidents_graphml/3/351dd870-1329-11ef-aba1-33e212db0be8.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.104
+ 100.64.3.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.166
+ 100.64.55.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.97
+ 100.64.39.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.101
+ 100.64.18.101
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+ INCIDENT_LINK
+ 1715825317
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 351dd870-1329-11ef-aba1-33e212db0be8
+
+
+
diff --git a/graph/incidents_graphml/3/35301530-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/3/35301530-6393-11ee-a10b-9345395d0398.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..115fc250987c4e8504741a37068083a2ba68f791
--- /dev/null
+++ b/graph/incidents_graphml/3/35301530-6393-11ee-a10b-9345395d0398.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.188
+ 100.64.36.188
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696519439
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35301530-6393-11ee-a10b-9345395d0398
+
+
+
diff --git a/graph/incidents_graphml/3/3531a7c0-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/3/3531a7c0-097e-11ee-8b37-9ba18759a170.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e2a0f95c84d1b0c7d59150e5ccaf0fdcc784186
--- /dev/null
+++ b/graph/incidents_graphml/3/3531a7c0-097e-11ee-8b37-9ba18759a170.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.184
+ 100.64.69.184
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.79
+ USER-0015-1485.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3531a7c0-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3531a7c0-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3531a7c0-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3531a7c0-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3531a7c0-097e-11ee-8b37-9ba18759a170
+
+
+ INCIDENT_LINK
+ 1686614815
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3531a7c0-097e-11ee-8b37-9ba18759a170
+
+
+
diff --git a/graph/incidents_graphml/3/3532d360-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/3532d360-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..63661850658828fd7d0f05a9903fbd8ce16efbbb
--- /dev/null
+++ b/graph/incidents_graphml/3/3532d360-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.9
+ 100.64.53.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3532d360-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/35366ce0-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/35366ce0-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50548560da4d1c157f0bee2548dd2ce23087bc23
--- /dev/null
+++ b/graph/incidents_graphml/3/35366ce0-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.220
+ 100.64.4.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657204
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 35366ce0-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/35487e40-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/35487e40-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..236e9bbd6fecbaef22b50bf1f2956276aaaf3821
--- /dev/null
+++ b/graph/incidents_graphml/3/35487e40-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.9
+ 100.64.53.9
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339709
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35487e40-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/354a2a40-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/3/354a2a40-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8eb3375b1175327511dd3d42376fe7b3a35758e6
--- /dev/null
+++ b/graph/incidents_graphml/3/354a2a40-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.196
+ 100.64.28.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.63
+ USER-0015-1644.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 354a2a40-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 354a2a40-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/3/3554d690-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3554d690-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52cec8aa925d615d804e3c1d49006e62ba2e5ded
--- /dev/null
+++ b/graph/incidents_graphml/3/3554d690-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.81.19
+ USER-0015-1854.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199014
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3554d690-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/35562a50-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/3/35562a50-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ca9c9a8305499fbda725064ff3c9eeead0b0a6d
--- /dev/null
+++ b/graph/incidents_graphml/3/35562a50-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.235
+ 100.64.37.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.236
+ 100.64.37.236
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.45
+ 100.64.13.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.91
+ 100.64.18.91
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159238
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35562a50-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/3/3565d030-f0f6-11ee-9141-97f57fdeb7f9.graphml b/graph/incidents_graphml/3/3565d030-f0f6-11ee-9141-97f57fdeb7f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ab0c57e37f908d124f60a9e84e350c4d3c5c3b9
--- /dev/null
+++ b/graph/incidents_graphml/3/3565d030-f0f6-11ee-9141-97f57fdeb7f9.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.83.120.212
+ 10.83.120.212
+ ["Exploiting Host"]
+ 0.841796875
+ ["Precinct","PAN NGFW","Windows Active Directory"]
+
+
+ HOST
+ 100.64.69.152
+ 100.64.69.152
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.153
+ USER-0015-1523.example.internal
+ ["Exploiting Target"]
+ 0.7890625
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.154
+ 100.64.69.154
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.100
+ 100.64.68.100
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.69.155
+ 100.64.69.155
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+ INCIDENT_LINK
+ 1712065074
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3565d030-f0f6-11ee-9141-97f57fdeb7f9
+
+
+
diff --git a/graph/incidents_graphml/3/357132b0-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/357132b0-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dbcb905072e000285636f4885b2e8a6e0bdf3b37
--- /dev/null
+++ b/graph/incidents_graphml/3/357132b0-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.68.1
+ 100.64.68.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477051
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 357132b0-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/357626a0-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/3/357626a0-299b-11ef-bcba-e72095bb0d10.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08a0385f09455092e3eb44eea12d6395b389e254
--- /dev/null
+++ b/graph/incidents_graphml/3/357626a0-299b-11ef-bcba-e72095bb0d10.graphml
@@ -0,0 +1,179 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.69
+ 100.64.60.69
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.70
+ 100.64.60.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.159
+ 100.64.32.159
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+ INCIDENT_LINK
+ 1718293206
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 357626a0-299b-11ef-bcba-e72095bb0d10
+
+
+
diff --git a/graph/incidents_graphml/3/3577f2b0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/3577f2b0-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44319efc86ad20d61e76dbc40808d3f61df5b33d
--- /dev/null
+++ b/graph/incidents_graphml/3/3577f2b0-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.28
+ USER-0015-1345.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339709
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3577f2b0-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/357f1560-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/357f1560-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5fca6b1fbcf71f484f20ca92bdfa348d94595f04
--- /dev/null
+++ b/graph/incidents_graphml/3/357f1560-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 357f1560-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/3589e9b0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3589e9b0-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2aa43c1e3c0e7bdff5338e62713b13afd4d0bb5
--- /dev/null
+++ b/graph/incidents_graphml/3/3589e9b0-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.16
+ 100.64.57.16
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597075
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3589e9b0-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/358b7ab0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/358b7ab0-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43f92fe4e042d50c0ff6d8530bb23a5ffd908c4b
--- /dev/null
+++ b/graph/incidents_graphml/3/358b7ab0-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.28
+ USER-0015-1345.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339710
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 358b7ab0-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/358d9450-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/358d9450-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c4c6458374178ec3cc80ffc6c4ddfdd339766c8
--- /dev/null
+++ b/graph/incidents_graphml/3/358d9450-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.58
+ 100.64.21.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477052
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 358d9450-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/359184a0-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/359184a0-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff6e26bc3b710749451012a3d25b5006528346c5
--- /dev/null
+++ b/graph/incidents_graphml/3/359184a0-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.161
+ 100.64.45.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783546
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 359184a0-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/35976d90-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/35976d90-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09299b0d9366ab50b3338f2ea7c602b4271f973b
--- /dev/null
+++ b/graph/incidents_graphml/3/35976d90-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.50
+ 100.64.80.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ USER-0015-1727.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.80.51
+ 100.64.80.51
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1677324372
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35976d90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324372
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35976d90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324372
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35976d90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324372
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35976d90-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/3/359e3620-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/359e3620-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea3760eaa39f512dfc7aeac2b99d48bd65838474
--- /dev/null
+++ b/graph/incidents_graphml/3/359e3620-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.68.1
+ 100.64.68.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477052
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 359e3620-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/359ecb10-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/359ecb10-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe80af53988d67d0e4bce9e14d83f7541122e8a3
--- /dev/null
+++ b/graph/incidents_graphml/3/359ecb10-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.110
+ 100.64.22.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783546
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 359ecb10-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/35a76780-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/35a76780-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..212309457a1f7761c55e135a7d4190ce37d4cb68
--- /dev/null
+++ b/graph/incidents_graphml/3/35a76780-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.22
+ 100.64.53.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934895
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35a76780-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/35ae0d50-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/35ae0d50-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62d1f390922c71c07a75246c58747be35ec5014a
--- /dev/null
+++ b/graph/incidents_graphml/3/35ae0d50-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.110
+ 100.64.22.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783546
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 35ae0d50-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/35b74600-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/35b74600-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f707ecd61110626d5026ea10f45840bc95081436
--- /dev/null
+++ b/graph/incidents_graphml/3/35b74600-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.22
+ 100.64.53.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934895
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 35b74600-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/35b7a470-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35b7a470-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd0f23d0fa039a5a881aee69bb8f29866f508e4a
--- /dev/null
+++ b/graph/incidents_graphml/3/35b7a470-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.233
+ 100.64.93.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35b7a470-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35be5b30-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35be5b30-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af5696a60042842b65b7dcbbf11655b0fe1cd80d
--- /dev/null
+++ b/graph/incidents_graphml/3/35be5b30-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.233
+ 100.64.93.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 35be5b30-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35c8bb70-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35c8bb70-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9449668d12d9bb9170a6803bd22f9e313d8aa68
--- /dev/null
+++ b/graph/incidents_graphml/3/35c8bb70-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.234
+ 100.64.93.234
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35c8bb70-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35cace00-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/35cace00-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7459ab8c5e927681d153cfb1dbc4977a05bef007
--- /dev/null
+++ b/graph/incidents_graphml/3/35cace00-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.24
+ 100.64.53.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934895
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 35cace00-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/35cf7230-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35cf7230-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b07c8dc18c86a7bcc4f54690fc7f5e9f022a7164
--- /dev/null
+++ b/graph/incidents_graphml/3/35cf7230-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.234
+ 100.64.93.234
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 35cf7230-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35deb470-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35deb470-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76c710464a7eb054874d3ff666350e92afef554a
--- /dev/null
+++ b/graph/incidents_graphml/3/35deb470-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.239
+ 100.64.93.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35deb470-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35e5e060-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35e5e060-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f29569cb06affa361340872f1d74eb2e6efc156
--- /dev/null
+++ b/graph/incidents_graphml/3/35e5e060-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.239
+ 100.64.93.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 35e5e060-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35ea1cb0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/35ea1cb0-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7704ca13e14562bb635ea6a1c187f9d54689f491
--- /dev/null
+++ b/graph/incidents_graphml/3/35ea1cb0-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.88
+ 100.64.49.88
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692507
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35ea1cb0-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/3/35ebd3d0-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35ebd3d0-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..05535df3233a353d7bb2281e2269f9ce05b4c653
--- /dev/null
+++ b/graph/incidents_graphml/3/35ebd3d0-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.235
+ 100.64.93.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 35ebd3d0-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35f5e5f0-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35f5e5f0-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40c12056d007dc52ca76f0c3b76a27072f289fc7
--- /dev/null
+++ b/graph/incidents_graphml/3/35f5e5f0-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.93.235
+ 100.64.93.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662420836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 35f5e5f0-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/35f680b0-2a33-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/3/35f680b0-2a33-11ee-9959-8506340212c8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d724520933d514aa9f31a94f2bfab7c900fb6d0
--- /dev/null
+++ b/graph/incidents_graphml/3/35f680b0-2a33-11ee-9959-8506340212c8.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.165
+ 100.64.68.165
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.34.133
+ 100.64.34.133
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.166
+ 100.64.68.166
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1690210993
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35f680b0-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210993
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35f680b0-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210993
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35f680b0-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210993
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35f680b0-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210993
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35f680b0-2a33-11ee-9959-8506340212c8
+
+
+ INCIDENT_LINK
+ 1690210993
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35f680b0-2a33-11ee-9959-8506340212c8
+
+
+
diff --git a/graph/incidents_graphml/3/35ff5260-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/35ff5260-3655-11ef-872b-bfba974a2ef0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf3dc59f4ef978e03f9d050f51bc9add4106843c
--- /dev/null
+++ b/graph/incidents_graphml/3/35ff5260-3655-11ef-872b-bfba974a2ef0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.88
+ 100.64.49.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719692507
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 35ff5260-3655-11ef-872b-bfba974a2ef0
+
+
+
diff --git a/graph/incidents_graphml/3/360b3260-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/360b3260-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4441a29ea27b4aa7b61022a389f6326b7c562f75
--- /dev/null
+++ b/graph/incidents_graphml/3/360b3260-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.196
+ 100.64.33.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934896
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 360b3260-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/360eff80-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/360eff80-8acf-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c310a6f0d3ba0492bae34dcb70c4b69804b82e18
--- /dev/null
+++ b/graph/incidents_graphml/3/360eff80-8acf-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.50
+ 100.64.16.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700833306
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 360eff80-8acf-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/3/361108b0-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/361108b0-5e3f-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4c2e76d46adeb70a70ba8df0568db9cac46684c7
--- /dev/null
+++ b/graph/incidents_graphml/3/361108b0-5e3f-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.193
+ 100.64.75.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.1.188
+ HOST-14751
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667786110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 361108b0-5e3f-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667786110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 361108b0-5e3f-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/3/36143d00-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/36143d00-5e3f-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b86d4a91ec9870cf7862e46edd94bfda063b525a
--- /dev/null
+++ b/graph/incidents_graphml/3/36143d00-5e3f-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.222
+ 100.64.25.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.238
+ 100.64.71.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1667786110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36143d00-5e3f-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667786110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36143d00-5e3f-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/3/361dcc90-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/361dcc90-8acf-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6095c136d0bec6d3ea06cf718d9a07b7a2c83c95
--- /dev/null
+++ b/graph/incidents_graphml/3/361dcc90-8acf-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.50
+ 100.64.16.50
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700833306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 361dcc90-8acf-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/3/36221ee0-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/36221ee0-920d-11ee-afdd-6dc3cf6fdc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ab1f284efb3cbdaf26439eb512a51d175c91bcb
--- /dev/null
+++ b/graph/incidents_graphml/3/36221ee0-920d-11ee-afdd-6dc3cf6fdc52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.176
+ 100.64.35.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701629593
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36221ee0-920d-11ee-afdd-6dc3cf6fdc52
+
+
+
diff --git a/graph/incidents_graphml/3/3628a570-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/3628a570-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2c47b03c7d37812ae84f23219fbc7a2e3789764
--- /dev/null
+++ b/graph/incidents_graphml/3/3628a570-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.26
+ 100.64.53.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934896
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3628a570-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/362c2c40-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/362c2c40-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1364d4c1a39bc19fc0d0c690a32f524cfb0611b
--- /dev/null
+++ b/graph/incidents_graphml/3/362c2c40-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.185
+ 100.64.20.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685210363
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 362c2c40-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/362d5cf0-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/362d5cf0-8acf-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..269929c51d39d138c63d1746554fb734624a1762
--- /dev/null
+++ b/graph/incidents_graphml/3/362d5cf0-8acf-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700833306
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 362d5cf0-8acf-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/3/36368ca0-e31f-11ee-acbf-dfdefbfef3c0.graphml b/graph/incidents_graphml/3/36368ca0-e31f-11ee-acbf-dfdefbfef3c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba74de41090ffd24b2c50e8f7633b8ce0125c1bd
--- /dev/null
+++ b/graph/incidents_graphml/3/36368ca0-e31f-11ee-acbf-dfdefbfef3c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.110
+ 100.64.26.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1710543368
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36368ca0-e31f-11ee-acbf-dfdefbfef3c0
+
+
+
diff --git a/graph/incidents_graphml/3/3638d210-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/3638d210-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c68f0832c7a49d6f584d9e6ee3727b3a026a9d6
--- /dev/null
+++ b/graph/incidents_graphml/3/3638d210-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934896
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3638d210-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/363e2c60-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/363e2c60-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9fbeb8c4c19fc06a22d21be374b1daab3948b3d9
--- /dev/null
+++ b/graph/incidents_graphml/3/363e2c60-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661661057
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 363e2c60-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/363f02b0-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/363f02b0-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9209904c644e6e552dbe7bd5fc0499f715ce6aad
--- /dev/null
+++ b/graph/incidents_graphml/3/363f02b0-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.199
+ 100.64.16.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783547
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 363f02b0-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/363f1030-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/363f1030-8acf-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2808a28a56177939a8fa2296788c8d6a88ed599
--- /dev/null
+++ b/graph/incidents_graphml/3/363f1030-8acf-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.52
+ 100.64.16.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700833306
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 363f1030-8acf-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/3/363f79f0-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/363f79f0-27a9-11ee-82e1-59dd32b62381.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e73db2a3195c797a338cbe0d96eafd8b2894400f
--- /dev/null
+++ b/graph/incidents_graphml/3/363f79f0-27a9-11ee-82e1-59dd32b62381.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.69
+ 100.64.25.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689931821
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 363f79f0-27a9-11ee-82e1-59dd32b62381
+
+
+
diff --git a/graph/incidents_graphml/3/3647ed40-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/3647ed40-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48664795e0b6e2346e71d811661dbc404e02b0a3
--- /dev/null
+++ b/graph/incidents_graphml/3/3647ed40-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934896
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3647ed40-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/36497710-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36497710-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a11f3b99dc44ca8702e7edb128aa0f514bd9335b
--- /dev/null
+++ b/graph/incidents_graphml/3/36497710-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.211
+ 100.64.12.211
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684930761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36497710-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/364aa0b0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/364aa0b0-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb96afbf00c2e908b41e276e7bb3fa004c78c5ac
--- /dev/null
+++ b/graph/incidents_graphml/3/364aa0b0-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.75
+ 100.64.47.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 364aa0b0-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/364d6810-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/364d6810-8acf-11ee-bba1-ef6459fc1a52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0661afbb87d861fe3e367f6bd84030b13674a8bd
--- /dev/null
+++ b/graph/incidents_graphml/3/364d6810-8acf-11ee-bba1-ef6459fc1a52.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.52
+ 100.64.16.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700833306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 364d6810-8acf-11ee-bba1-ef6459fc1a52
+
+
+
diff --git a/graph/incidents_graphml/3/364e31f0-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/364e31f0-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35fba75cf6aa32cfc7f72731ee3591e652c93e7a
--- /dev/null
+++ b/graph/incidents_graphml/3/364e31f0-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.93
+ 100.64.73.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661661057
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 364e31f0-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/36538920-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/36538920-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb0bfe0d9f4b2b79699c406f4df10f0b903a6a37
--- /dev/null
+++ b/graph/incidents_graphml/3/36538920-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.93
+ 100.64.73.93
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661661057
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36538920-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/36542240-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/36542240-5e42-11ee-a40d-8da4c06aaa42.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ecff23921947d79321409e7b58c4043424e5940
--- /dev/null
+++ b/graph/incidents_graphml/3/36542240-5e42-11ee-a40d-8da4c06aaa42.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.28
+ 100.64.53.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695934896
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36542240-5e42-11ee-a40d-8da4c06aaa42
+
+
+
diff --git a/graph/incidents_graphml/3/365458f0-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/365458f0-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54dc1190730097129be3d3a7460339333fbe3810
--- /dev/null
+++ b/graph/incidents_graphml/3/365458f0-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821668
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 365458f0-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/365b5150-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/365b5150-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd744f00556e90e34bef94327ce0cb148db2b85e
--- /dev/null
+++ b/graph/incidents_graphml/3/365b5150-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661661057
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 365b5150-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/365fe530-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/365fe530-268a-11ed-ad3b-a34fab330a0e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5497a3f8f8cdcda7e9743c2f80c06aa4a7756887
--- /dev/null
+++ b/graph/incidents_graphml/3/365fe530-268a-11ed-ad3b-a34fab330a0e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.202
+ 100.64.72.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.3.77
+ 100.64.3.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661661057
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 365fe530-268a-11ed-ad3b-a34fab330a0e
+
+
+
diff --git a/graph/incidents_graphml/3/36683bc0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/36683bc0-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5360ed2a47e986f26e017e81a171d173fd98f9d
--- /dev/null
+++ b/graph/incidents_graphml/3/36683bc0-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.18
+ 100.64.57.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597077
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36683bc0-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/366cbfc0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/366cbfc0-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c86a91d0b2532b331ff2700c85a17b1bc82cdddb
--- /dev/null
+++ b/graph/incidents_graphml/3/366cbfc0-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.155
+ 100.64.76.155
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.144
+ 100.64.72.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685893692
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 366cbfc0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893692
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 366cbfc0-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/3/36714a60-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36714a60-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a7618e57d7ec326d5975b7c09a8bdb7bf47ea47
--- /dev/null
+++ b/graph/incidents_graphml/3/36714a60-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.211
+ 100.64.12.211
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684930761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36714a60-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/36749f80-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/36749f80-35a6-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c8d9ba343235fd4ed2e2d224484e4426403f95a
--- /dev/null
+++ b/graph/incidents_graphml/3/36749f80-35a6-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691469849
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36749f80-35a6-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/3/367707e0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/367707e0-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04da129eed80c96441e3695c3d2add6bcf4abad5
--- /dev/null
+++ b/graph/incidents_graphml/3/367707e0-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.75
+ 100.64.47.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665103
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 367707e0-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/3682a6d0-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/3682a6d0-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..876a1b193239c6999998fb91964cc16a07eabc5c
--- /dev/null
+++ b/graph/incidents_graphml/3/3682a6d0-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.164
+ 100.64.34.164
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3682a6d0-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/36832df0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/36832df0-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed6bf3b7316b33b4d1e9ff29cb2abc037a4748dd
--- /dev/null
+++ b/graph/incidents_graphml/3/36832df0-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.74
+ 100.64.30.74
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.55
+ 100.64.1.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685893693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36832df0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893693
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36832df0-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/3/36908980-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/36908980-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5cb43279182fd4afa4f22acf9ba1d6d9f86e856
--- /dev/null
+++ b/graph/incidents_graphml/3/36908980-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.125
+ 100.64.58.125
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437276
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36908980-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/369218d0-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/369218d0-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..17ce9cfab9a4e581ee47dca8e849fd398ba2883a
--- /dev/null
+++ b/graph/incidents_graphml/3/369218d0-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.213
+ 100.64.12.213
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684930761
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 369218d0-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/36967f60-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/36967f60-35a6-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2202ab0bab24d0858a89cf5aa60a997335aadd81
--- /dev/null
+++ b/graph/incidents_graphml/3/36967f60-35a6-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.16
+ 100.64.9.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691469849
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36967f60-35a6-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/3/369a4840-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/369a4840-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4602e3ed0ca5893a992867d76ac12fa845c6ef16
--- /dev/null
+++ b/graph/incidents_graphml/3/369a4840-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.18
+ 100.64.57.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597077
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 369a4840-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/36b36410-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/3/36b36410-fec6-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59197dcff91697c58adc59b7e2f2c3cb5bf68c80
--- /dev/null
+++ b/graph/incidents_graphml/3/36b36410-fec6-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.112
+ 100.64.22.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.146
+ 100.64.24.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.147
+ 100.64.24.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.107
+ 100.64.18.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.148
+ 100.64.24.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.149
+ 100.64.24.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b36410-fec6-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/3/36b46130-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/36b46130-70fa-11ee-8198-9db2a0bce259.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0efb6718c56685a18574ae6c83d332bd7ce8ef62
--- /dev/null
+++ b/graph/incidents_graphml/3/36b46130-70fa-11ee-8198-9db2a0bce259.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.12
+ 100.64.17.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697993045
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 36b46130-70fa-11ee-8198-9db2a0bce259
+
+
+
diff --git a/graph/incidents_graphml/3/36b5b250-4404-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/3/36b5b250-4404-11ef-b0b5-17c176975c0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ae1436505b718f022393c1e81af3ec7eebaac8b
--- /dev/null
+++ b/graph/incidents_graphml/3/36b5b250-4404-11ef-b0b5-17c176975c0f.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.137
+ 100.64.50.137
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.138
+ 100.64.50.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.137
+ 100.64.16.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197036
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36b5b250-4404-11ef-b0b5-17c176975c0f
+
+
+
diff --git a/graph/incidents_graphml/3/36b9dd40-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/36b9dd40-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f20fe44a051ac46d1da0381d43c9602983d1655d
--- /dev/null
+++ b/graph/incidents_graphml/3/36b9dd40-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.77
+ 100.64.47.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665104
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36b9dd40-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/36bf8bf0-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/3/36bf8bf0-e873-11ee-9a77-df185ba75d8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8a2cd9de6885e1dca22e33637c4b0aef0094fd5
--- /dev/null
+++ b/graph/incidents_graphml/3/36bf8bf0-e873-11ee-9a77-df185ba75d8e.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.89
+ 100.64.49.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ HOST
+ 100.64.70.193
+ 100.64.70.193
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1711129203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36bf8bf0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36bf8bf0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36bf8bf0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36bf8bf0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36bf8bf0-e873-11ee-9a77-df185ba75d8e
+
+
+ INCIDENT_LINK
+ 1711129203
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36bf8bf0-e873-11ee-9a77-df185ba75d8e
+
+
+
diff --git a/graph/incidents_graphml/3/36bfcea0-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/36bfcea0-6590-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..641d75b1c30669c30f0442a113bfadaf1b57ac8d
--- /dev/null
+++ b/graph/incidents_graphml/3/36bfcea0-6590-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.52
+ 100.64.32.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.53
+ 100.64.32.53
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.54
+ 100.64.32.54
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.100
+ 100.64.21.100
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.62
+ 100.64.26.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.55
+ 100.64.32.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.56
+ 100.64.32.56
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.57
+ 100.64.32.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738056
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36bfcea0-6590-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/3/36c47b10-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/3/36c47b10-fec6-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea0eb53419913a18532bc487c3bd63e54340b964
--- /dev/null
+++ b/graph/incidents_graphml/3/36c47b10-fec6-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.154
+ 100.64.24.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.155
+ 100.64.24.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.55
+ 100.64.16.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c47b10-fec6-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/3/36c4e580-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/36c4e580-1dab-11ed-b2e7-abaef9f1b8f2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f63a56f664bcc4c3c0289c6951a6168b709d0b35
--- /dev/null
+++ b/graph/incidents_graphml/3/36c4e580-1dab-11ed-b2e7-abaef9f1b8f2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.120
+ 100.64.76.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.58
+ 100.64.1.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.121
+ 100.64.76.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660685671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+ INCIDENT_LINK
+ 1660685671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2
+
+
+
diff --git a/graph/incidents_graphml/3/36c67b60-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/36c67b60-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa9f8f8adf10f42f3a41bcde02b5bac0301eb3d0
--- /dev/null
+++ b/graph/incidents_graphml/3/36c67b60-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.97
+ 100.64.35.97
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36c67b60-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/3/36ca9a60-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/36ca9a60-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c73379216681b3ed59034789ab1f9e6e73609e3d
--- /dev/null
+++ b/graph/incidents_graphml/3/36ca9a60-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.3.149
+ 100.64.3.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821669
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36ca9a60-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/36cdae20-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/36cdae20-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66635937b61d14c655f4a43c6a1ef9ce4db7e530
--- /dev/null
+++ b/graph/incidents_graphml/3/36cdae20-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.126
+ 100.64.49.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36cdae20-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/36ce3d50-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/36ce3d50-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..619c51bf94af6f6e1457a75da20af0822dcf7798
--- /dev/null
+++ b/graph/incidents_graphml/3/36ce3d50-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.31
+ 100.64.15.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197583
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36ce3d50-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197583
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36ce3d50-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/36d20fa0-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/3/36d20fa0-fec6-11ee-beca-89f62fdf83e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a906a78243c71b6928ed5530d9b3dbbcf48db259
--- /dev/null
+++ b/graph/incidents_graphml/3/36d20fa0-fec6-11ee-beca-89f62fdf83e2.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.45
+ 100.64.13.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.160
+ 100.64.24.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.24.161
+ 100.64.24.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+ INCIDENT_LINK
+ 1713583777
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36d20fa0-fec6-11ee-beca-89f62fdf83e2
+
+
+
diff --git a/graph/incidents_graphml/3/36d48c80-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/36d48c80-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a05dcdad19c0d61a239f8a00c966cb54e2a3edd2
--- /dev/null
+++ b/graph/incidents_graphml/3/36d48c80-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.138
+ 100.64.19.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657207
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36d48c80-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/36d5ffa0-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36d5ffa0-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dc4ac961ca0764f85edfebec1cda04fe61e41a50
--- /dev/null
+++ b/graph/incidents_graphml/3/36d5ffa0-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684930762
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36d5ffa0-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/36da80c0-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/36da80c0-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eaa91bfb6a7fccf53585e3eaef453f1e8c12e80c
--- /dev/null
+++ b/graph/incidents_graphml/3/36da80c0-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.86
+ 100.64.40.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1703474283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36da80c0-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/36db20e0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/36db20e0-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9544b0129d737238d75cebf4f9d7bfdda3956c10
--- /dev/null
+++ b/graph/incidents_graphml/3/36db20e0-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.119
+ 100.64.13.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665104
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36db20e0-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/36dcf060-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/36dcf060-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2701fd657b9566784c37b245191f40812e5a078e
--- /dev/null
+++ b/graph/incidents_graphml/3/36dcf060-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.126
+ 100.64.49.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783548
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36dcf060-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/36ddfb00-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/36ddfb00-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a7183d02e848c5fb2bb34d3e73e16f842349855
--- /dev/null
+++ b/graph/incidents_graphml/3/36ddfb00-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.97
+ 100.64.35.97
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723266
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36ddfb00-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/3/36e86370-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/36e86370-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7494fa35a9c4babe0f488541026773c3a467808
--- /dev/null
+++ b/graph/incidents_graphml/3/36e86370-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.40.86
+ 100.64.40.86
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 36e86370-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/36edb940-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/36edb940-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93fb48c31709af6c1b975a1dcb52415396c78326
--- /dev/null
+++ b/graph/incidents_graphml/3/36edb940-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.183
+ 100.64.67.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36edb940-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/36ef8e90-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/36ef8e90-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..493055e85cd71d8ebff0bc6e63c9cb999b840220
--- /dev/null
+++ b/graph/incidents_graphml/3/36ef8e90-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.138
+ 100.64.19.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657207
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 36ef8e90-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/36f0e6c0-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/36f0e6c0-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f75b874697240183f4a7feb8d1f1b775414b51e1
--- /dev/null
+++ b/graph/incidents_graphml/3/36f0e6c0-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.105
+ 100.64.35.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723266
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36f0e6c0-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/3/36f5bca0-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36f5bca0-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61209f20ff2dc7c62bf2bc172813caa42a53127a
--- /dev/null
+++ b/graph/incidents_graphml/3/36f5bca0-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.42
+ 100.64.11.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684930762
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 36f5bca0-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/36f6e260-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/36f6e260-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80055658d631b427fd74e7146ae9fc26134d665b
--- /dev/null
+++ b/graph/incidents_graphml/3/36f6e260-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.94.108
+ 100.64.94.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 36f6e260-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/36fe6050-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/36fe6050-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f92e0224bfc9c027d437b69d60bf114f72d7227
--- /dev/null
+++ b/graph/incidents_graphml/3/36fe6050-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.119
+ 100.64.13.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 36fe6050-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/36ffe8d0-3ca7-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/3/36ffe8d0-3ca7-11ee-874c-c948d9dda210.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..778801fd1d4983e67249934a0e343a44c1330ae3
--- /dev/null
+++ b/graph/incidents_graphml/3/36ffe8d0-3ca7-11ee-874c-c948d9dda210.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.145
+ 100.64.41.145
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692239937
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 36ffe8d0-3ca7-11ee-874c-c948d9dda210
+
+
+
diff --git a/graph/incidents_graphml/3/3702e820-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/3702e820-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d040ccb4a9758f0b76eefb30a1dc6b65cf5d6e01
--- /dev/null
+++ b/graph/incidents_graphml/3/3702e820-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.105
+ 100.64.35.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723267
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3702e820-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/3/37044e80-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/37044e80-4ab1-11ee-b857-e5551c73ae93.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d3ff43ebd25e4d4106235b0230fba24663a035b0
--- /dev/null
+++ b/graph/incidents_graphml/3/37044e80-4ab1-11ee-b857-e5551c73ae93.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.183
+ 100.64.67.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693783548
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37044e80-4ab1-11ee-b857-e5551c73ae93
+
+
+
diff --git a/graph/incidents_graphml/3/370e3a20-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/370e3a20-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a564d569d57dcb323cf57682086a078ee2ea3f1
--- /dev/null
+++ b/graph/incidents_graphml/3/370e3a20-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657207
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 370e3a20-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/3710abf0-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/3710abf0-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92cb5f16af7035affd6bc1a1f8f33271482aab01
--- /dev/null
+++ b/graph/incidents_graphml/3/3710abf0-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.109
+ 100.64.94.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1703474283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3710abf0-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/3717b4b0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/3717b4b0-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..889dbf6180f9c2208f6110a8905a2907cf78e78a
--- /dev/null
+++ b/graph/incidents_graphml/3/3717b4b0-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.47.79
+ 100.64.47.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3717b4b0-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/37195650-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/37195650-246c-11ef-b309-557c2f3770a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..070ad932cfa19907e7275acc777ae04fab8be539
--- /dev/null
+++ b/graph/incidents_graphml/3/37195650-246c-11ef-b309-557c2f3770a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.100
+ 100.64.35.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717723267
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37195650-246c-11ef-b309-557c2f3770a9
+
+
+
diff --git a/graph/incidents_graphml/3/3720d890-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/3720d890-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c882f0f1d9a224d0268251ccb60a3167b132050
--- /dev/null
+++ b/graph/incidents_graphml/3/3720d890-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.94.109
+ 100.64.94.109
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1703474283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3720d890-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/37226940-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37226940-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed34325c199eed5248630ec54e5421a9b0e9d780
--- /dev/null
+++ b/graph/incidents_graphml/3/37226940-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.127
+ 100.64.58.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437277
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37226940-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/372c7080-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/372c7080-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffee32a4adb0e0525a80819520f0a7b7ca3de437
--- /dev/null
+++ b/graph/incidents_graphml/3/372c7080-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657207
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 372c7080-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/372e3330-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/372e3330-11b9-11ed-a4c1-252f95debd7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08bd99671458baefe38e664d042a1e30c5d0f2fe
--- /dev/null
+++ b/graph/incidents_graphml/3/372e3330-11b9-11ed-a4c1-252f95debd7b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.132.192
+ 192.168.132.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.0.105
+ 100.64.0.105
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 372e3330-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 372e3330-11b9-11ed-a4c1-252f95debd7b
+
+
+
diff --git a/graph/incidents_graphml/3/37315d60-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37315d60-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2208966283c2bd7066d979807e4571a746d7ada0
--- /dev/null
+++ b/graph/incidents_graphml/3/37315d60-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.127
+ 100.64.58.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437277
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37315d60-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/3732a570-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3732a570-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f588d0e639450d2b6fdcd7ddb6b9ba5a1c6f8ed4
--- /dev/null
+++ b/graph/incidents_graphml/3/3732a570-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.86
+ 100.64.52.86
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.234
+ 100.64.71.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690703198
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3732a570-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/373c0590-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/373c0590-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..abd1eb30a83bb8b6bcbad97369a00778f9cacc74
--- /dev/null
+++ b/graph/incidents_graphml/3/373c0590-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.79
+ 100.64.47.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 373c0590-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/373e8570-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/373e8570-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be32a9ccb0286359c2844a144972c8c582345ac1
--- /dev/null
+++ b/graph/incidents_graphml/3/373e8570-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684930762
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 373e8570-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/373f1900-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/373f1900-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a25cab2c9bf7fa422b1eb87b5a103413b72493b
--- /dev/null
+++ b/graph/incidents_graphml/3/373f1900-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.106
+ 100.64.19.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437277
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 373f1900-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/37432da0-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/37432da0-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..caf8e70b9b1f1dad1b945809e8b367186f15b82c
--- /dev/null
+++ b/graph/incidents_graphml/3/37432da0-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474283
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37432da0-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/3744a670-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3744a670-7c83-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12ccb286c52a7865fa77f831f57c594b8aec3807
--- /dev/null
+++ b/graph/incidents_graphml/3/3744a670-7c83-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.159
+ 100.64.52.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699261350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3744a670-7c83-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/374b1500-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/374b1500-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62b1f24c3a29916c97e1b888c25893ce2a275609
--- /dev/null
+++ b/graph/incidents_graphml/3/374b1500-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.64
+ 100.64.56.64
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 374b1500-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/374e0d20-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/374e0d20-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ee38844c647acccc5542938a48f7d8499589922
--- /dev/null
+++ b/graph/incidents_graphml/3/374e0d20-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.106
+ 100.64.19.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437278
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 374e0d20-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/37504d00-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/37504d00-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f811d5a4eeebd40cfe7582ab8d5dea3140ea7c2b
--- /dev/null
+++ b/graph/incidents_graphml/3/37504d00-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.112
+ 100.64.94.112
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37504d00-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/37540fc0-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/37540fc0-7c83-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a72e8983580af4197522374584301203ab8ad4cf
--- /dev/null
+++ b/graph/incidents_graphml/3/37540fc0-7c83-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.159
+ 100.64.52.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699261350
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37540fc0-7c83-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/37588990-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/37588990-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98e879d343a023dbb5c1e7bfbe52fff7eea3f183
--- /dev/null
+++ b/graph/incidents_graphml/3/37588990-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.140
+ 100.64.19.140
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657208
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37588990-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/3758d450-3caa-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/3/3758d450-3caa-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ebf1711a8710275db9207c867c538d3b43b1052
--- /dev/null
+++ b/graph/incidents_graphml/3/3758d450-3caa-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.27
+ 100.64.12.27
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.90.172
+ 100.64.90.172
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720388724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3758d450-3caa-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720388724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3758d450-3caa-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720388724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3758d450-3caa-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720388724
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3758d450-3caa-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/3/375f8760-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/375f8760-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25c64dd0a8eb4612d99391caf8746e0a366e5446
--- /dev/null
+++ b/graph/incidents_graphml/3/375f8760-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.56.64
+ 100.64.56.64
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821670
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 375f8760-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/37605290-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/37605290-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b61434bb7324e9e786998787598c90417cbe0a5
--- /dev/null
+++ b/graph/incidents_graphml/3/37605290-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.112
+ 100.64.94.112
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1703474284
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37605290-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/3761a4b0-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3761a4b0-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dde58be3db106afa3d138335ba5c5fc1db2d658
--- /dev/null
+++ b/graph/incidents_graphml/3/3761a4b0-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.186
+ 100.64.73.186
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690703198
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3761a4b0-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/3762ea70-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3762ea70-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac1b41b861722bbf4f0b5c1cc7114a616b4719ae
--- /dev/null
+++ b/graph/incidents_graphml/3/3762ea70-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.62
+ 100.64.18.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3762ea70-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/3765b640-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/3765b640-35a6-11ee-b049-cb5bed92530e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3294b6bc7bc430075439bed8a818b6e996e06885
--- /dev/null
+++ b/graph/incidents_graphml/3/3765b640-35a6-11ee-b049-cb5bed92530e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.227
+ 100.64.55.227
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691469850
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3765b640-35a6-11ee-b049-cb5bed92530e
+
+
+
diff --git a/graph/incidents_graphml/3/376ab200-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/376ab200-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf1432b9be64d25795894c74ed8b67d8760ffd1c
--- /dev/null
+++ b/graph/incidents_graphml/3/376ab200-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.173
+ 100.64.67.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462514
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 376ab200-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/3/3770a610-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3770a610-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a673ee0d339f7a9ac5746180cc870eb9966a8bb
--- /dev/null
+++ b/graph/incidents_graphml/3/3770a610-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.62
+ 100.64.18.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868458
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3770a610-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/37735d80-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37735d80-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5d543e61aa0eef88942a90cd3c61eb7b3a399256
--- /dev/null
+++ b/graph/incidents_graphml/3/37735d80-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821670
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37735d80-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/37749070-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37749070-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68fb07bec25685208f972330b23ac53f9283fc9d
--- /dev/null
+++ b/graph/incidents_graphml/3/37749070-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.186
+ 100.64.73.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37749070-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/3775cd90-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/3775cd90-463d-11ed-9048-e52ef683aaf1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26eb9e9b96eb35f7c08ce258f344b813cb008822
--- /dev/null
+++ b/graph/incidents_graphml/3/3775cd90-463d-11ed-9048-e52ef683aaf1.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.39
+ 100.64.14.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.190
+ 100.64.72.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.170
+ 100.64.81.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.171
+ 100.64.81.171
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3775cd90-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3775cd90-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3775cd90-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3775cd90-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3775cd90-463d-11ed-9048-e52ef683aaf1
+
+
+
diff --git a/graph/incidents_graphml/3/377787f0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/377787f0-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c858df27ccf67bbc23f434c6a9f659dc20f9010
--- /dev/null
+++ b/graph/incidents_graphml/3/377787f0-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.81
+ 100.64.47.81
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 377787f0-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/377bb6f0-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/377bb6f0-11b9-11ed-a4c1-252f95debd7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6b18d0e883cd76ecc34d04f8dfe80eab09f6b77
--- /dev/null
+++ b/graph/incidents_graphml/3/377bb6f0-11b9-11ed-a4c1-252f95debd7b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.246
+ 100.64.80.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.92
+ 100.64.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.247
+ 100.64.80.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 377bb6f0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 377bb6f0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 377bb6f0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 377bb6f0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 377bb6f0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372271
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 377bb6f0-11b9-11ed-a4c1-252f95debd7b
+
+
+
diff --git a/graph/incidents_graphml/3/378cfa70-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/378cfa70-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2120326a9b652d83426540dc57660924c2e7a4e
--- /dev/null
+++ b/graph/incidents_graphml/3/378cfa70-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,387 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.226
+ 100.64.12.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.196
+ 100.64.73.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.121
+ 100.64.71.121
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.36.105
+ 100.64.36.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.57.248
+ 100.64.57.248
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.156
+ 100.64.71.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.128
+ 100.64.7.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.14.110
+ 100.64.14.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.197
+ 100.64.73.197
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 378cfa70-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/378e1880-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/378e1880-1a4c-11ee-a525-9fcef38978a9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3f6f157622dbc477b957088e32a1a64ac151cbc
--- /dev/null
+++ b/graph/incidents_graphml/3/378e1880-1a4c-11ee-a525-9fcef38978a9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.173
+ 100.64.67.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688462514
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 378e1880-1a4c-11ee-a525-9fcef38978a9
+
+
+
diff --git a/graph/incidents_graphml/3/37928550-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/37928550-12f9-11ee-92d4-c14c0b60b700.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc72bc2d04a2f4d252f40ebd549f54084cc50be6
--- /dev/null
+++ b/graph/incidents_graphml/3/37928550-12f9-11ee-92d4-c14c0b60b700.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.140
+ 100.64.19.140
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687657208
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37928550-12f9-11ee-92d4-c14c0b60b700
+
+
+
diff --git a/graph/incidents_graphml/3/37938fb0-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37938fb0-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed0a754365513b09d2a53031fed93978cc2b89b6
--- /dev/null
+++ b/graph/incidents_graphml/3/37938fb0-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821671
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37938fb0-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/37958a90-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/37958a90-463d-11ed-9048-e52ef683aaf1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6082751b25040feaff89e23f65ab86ab49ec0b44
--- /dev/null
+++ b/graph/incidents_graphml/3/37958a90-463d-11ed-9048-e52ef683aaf1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.172
+ 100.64.81.172
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.156
+ 100.64.72.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37958a90-463d-11ed-9048-e52ef683aaf1
+
+
+ INCIDENT_LINK
+ 1665146425
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37958a90-463d-11ed-9048-e52ef683aaf1
+
+
+
diff --git a/graph/incidents_graphml/3/3796b790-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/3796b790-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c00562eb394b963b6b925bd4618ba62c3e9847ba
--- /dev/null
+++ b/graph/incidents_graphml/3/3796b790-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.215
+ 100.64.12.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684930763
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3796b790-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/379744f0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/379744f0-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8cd3b41694434ee2d2261b1bb9a4e7c1c20329d
--- /dev/null
+++ b/graph/incidents_graphml/3/379744f0-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665105
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 379744f0-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/379a6a90-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/379a6a90-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91c5f88a0eac5ce5f26ee9d123d14e7ab9dba7a5
--- /dev/null
+++ b/graph/incidents_graphml/3/379a6a90-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.62
+ 100.64.78.62
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660860907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 379a6a90-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37a00d20-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/37a00d20-5e3f-11ed-95e5-b5536252f217.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1df69a6bb4a01e8737671fff4b92693c942c74ea
--- /dev/null
+++ b/graph/incidents_graphml/3/37a00d20-5e3f-11ed-95e5-b5536252f217.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.173
+ 100.64.23.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1667786112
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37a00d20-5e3f-11ed-95e5-b5536252f217
+
+
+ INCIDENT_LINK
+ 1667786112
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37a00d20-5e3f-11ed-95e5-b5536252f217
+
+
+
diff --git a/graph/incidents_graphml/3/37a1f560-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/37a1f560-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89b86f0ef6bacd438a18a3f3f485794547369629
--- /dev/null
+++ b/graph/incidents_graphml/3/37a1f560-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.68.1
+ 100.64.68.1
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477055
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37a1f560-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/37a259d0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37a259d0-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5be6071b2c0476f9e26bbe4b5f992ca0b5dd417b
--- /dev/null
+++ b/graph/incidents_graphml/3/37a259d0-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.62
+ 100.64.78.62
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660860907
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37a259d0-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37aa2200-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37aa2200-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80455cf69f7a0420092e59e89be92366bcc4b8e4
--- /dev/null
+++ b/graph/incidents_graphml/3/37aa2200-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.209
+ USER-0015-1772.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660860907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37aa2200-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37ac6270-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/37ac6270-fa2d-11ed-af18-a9f44b259145.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45d460a102a3bf0977642d723a3d4ac2f482313d
--- /dev/null
+++ b/graph/incidents_graphml/3/37ac6270-fa2d-11ed-af18-a9f44b259145.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.215
+ 100.64.12.215
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684930763
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37ac6270-fa2d-11ed-af18-a9f44b259145
+
+
+
diff --git a/graph/incidents_graphml/3/37adaaf0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37adaaf0-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3909b682ad5e5bb7fa764bb5381ea22ff40d8ce6
--- /dev/null
+++ b/graph/incidents_graphml/3/37adaaf0-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.101
+ 100.64.34.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.95
+ 100.64.74.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690760752
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37adaaf0-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760752
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37adaaf0-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/37aff500-8ce2-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/3/37aff500-8ce2-11ee-b145-63bb68632209.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3de94f64e6dbcc90b606cf8f39886e75c70539f
--- /dev/null
+++ b/graph/incidents_graphml/3/37aff500-8ce2-11ee-b145-63bb68632209.graphml
@@ -0,0 +1,401 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.62
+ 100.64.59.62
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.63
+ USER-0015-1432.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.64
+ 100.64.59.64
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.65
+ 100.64.59.65
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.57
+ USER-0015-1404.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.66
+ 100.64.59.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.67
+ 100.64.59.67
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.68
+ 100.64.59.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.72
+ 100.64.10.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.36
+ 100.64.19.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+ INCIDENT_LINK
+ 1701061372
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37aff500-8ce2-11ee-b145-63bb68632209
+
+
+
diff --git a/graph/incidents_graphml/3/37b1e790-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37b1e790-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..06a66681d40be5bf1767a1dddda5af3a5d01c72a
--- /dev/null
+++ b/graph/incidents_graphml/3/37b1e790-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.12.226
+ 100.64.12.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37b1e790-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/37b4d060-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37b4d060-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4c175ad422e0abfe37fe953079c6b5426619521
--- /dev/null
+++ b/graph/incidents_graphml/3/37b4d060-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.209
+ USER-0015-1772.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660860907
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37b4d060-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37b8cb50-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37b8cb50-9cb3-11ed-8977-e596d5530bb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9703524b4d32d2a7dcf33cd600c78b5efcb7440
--- /dev/null
+++ b/graph/incidents_graphml/3/37b8cb50-9cb3-11ed-8977-e596d5530bb8.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.20
+ 100.64.93.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-16922
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1968.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37b8cb50-9cb3-11ed-8977-e596d5530bb8
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37b8cb50-9cb3-11ed-8977-e596d5530bb8
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37b8cb50-9cb3-11ed-8977-e596d5530bb8
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37b8cb50-9cb3-11ed-8977-e596d5530bb8
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37b8cb50-9cb3-11ed-8977-e596d5530bb8
+
+
+
diff --git a/graph/incidents_graphml/3/37b9cfa0-66fc-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/3/37b9cfa0-66fc-11ee-869c-79758109a47c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45ac197de9144e9fb623ce62743323cdf739d058
--- /dev/null
+++ b/graph/incidents_graphml/3/37b9cfa0-66fc-11ee-869c-79758109a47c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.40
+ 100.64.78.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696894394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37b9cfa0-66fc-11ee-869c-79758109a47c
+
+
+
diff --git a/graph/incidents_graphml/3/37bdfb70-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37bdfb70-9cb3-11ed-8977-e596d5530bb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b55d1f66c08785a575d88e58d881a68da850b83
--- /dev/null
+++ b/graph/incidents_graphml/3/37bdfb70-9cb3-11ed-8977-e596d5530bb8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-16922
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.20
+ 100.64.93.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37bdfb70-9cb3-11ed-8977-e596d5530bb8
+
+
+
diff --git a/graph/incidents_graphml/3/37bf7940-f737-11ec-a489-7f4b63a312db.graphml b/graph/incidents_graphml/3/37bf7940-f737-11ec-a489-7f4b63a312db.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43c28ce302258331badcac038252f10399fc722c
--- /dev/null
+++ b/graph/incidents_graphml/3/37bf7940-f737-11ec-a489-7f4b63a312db.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.201
+ USER-0015-1625.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656457707
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37bf7940-f737-11ec-a489-7f4b63a312db
+
+
+
diff --git a/graph/incidents_graphml/3/37c22580-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/37c22580-253c-11ee-87a4-4902f15b2b60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b69f30249aec91bda0277c771643fc1c403a9b8
--- /dev/null
+++ b/graph/incidents_graphml/3/37c22580-253c-11ee-87a4-4902f15b2b60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689665106
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37c22580-253c-11ee-87a4-4902f15b2b60
+
+
+
diff --git a/graph/incidents_graphml/3/37c48a90-9c9d-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/3/37c48a90-9c9d-11ee-b60c-751684393f5d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..404dd4a2d99a1ea35e2e6cb6d36ff12a8a4dc49c
--- /dev/null
+++ b/graph/incidents_graphml/3/37c48a90-9c9d-11ee-b60c-751684393f5d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1702790955
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37c48a90-9c9d-11ee-b60c-751684393f5d
+
+
+ INCIDENT_LINK
+ 1702790955
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37c48a90-9c9d-11ee-b60c-751684393f5d
+
+
+
diff --git a/graph/incidents_graphml/3/37c53e10-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/37c53e10-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b0d72a40d679360472a01f06ab3933eb18e7f915
--- /dev/null
+++ b/graph/incidents_graphml/3/37c53e10-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.53.13
+ 100.64.53.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339713
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37c53e10-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/37c96d20-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37c96d20-9cb3-11ed-8977-e596d5530bb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f0a5b97c6c77752f6d5076359b953ec88fa15cc9
--- /dev/null
+++ b/graph/incidents_graphml/3/37c96d20-9cb3-11ed-8977-e596d5530bb8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.235
+ 100.64.6.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37c96d20-9cb3-11ed-8977-e596d5530bb8
+
+
+
diff --git a/graph/incidents_graphml/3/37c9b450-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/37c9b450-4e75-11ee-8a68-d180c8de201c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9cec3492f1ad68df4382dc62e48c3b5f0de2a88e
--- /dev/null
+++ b/graph/incidents_graphml/3/37c9b450-4e75-11ee-8a68-d180c8de201c.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.155
+ 100.64.7.155
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694197584
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37c9b450-4e75-11ee-8a68-d180c8de201c
+
+
+ INCIDENT_LINK
+ 1694197584
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37c9b450-4e75-11ee-8a68-d180c8de201c
+
+
+
diff --git a/graph/incidents_graphml/3/37c9c4f0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/37c9c4f0-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f65291e2785a7c5d6e46d64937bebc9d188fa1f
--- /dev/null
+++ b/graph/incidents_graphml/3/37c9c4f0-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.33.117
+ 100.64.33.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1706165081
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37c9c4f0-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/37cd16a0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37cd16a0-9cb3-11ed-8977-e596d5530bb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb836e78e18908479d31d3663b672d0d6f66c013
--- /dev/null
+++ b/graph/incidents_graphml/3/37cd16a0-9cb3-11ed-8977-e596d5530bb8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.6.235
+ 100.64.6.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37cd16a0-9cb3-11ed-8977-e596d5530bb8
+
+
+
diff --git a/graph/incidents_graphml/3/37cfd5c0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37cfd5c0-9cb3-11ed-8977-e596d5530bb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5a48c7fadb3127cf1fb7cadff87522424c5a4a3e
--- /dev/null
+++ b/graph/incidents_graphml/3/37cfd5c0-9cb3-11ed-8977-e596d5530bb8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.22
+ 100.64.93.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37cfd5c0-9cb3-11ed-8977-e596d5530bb8
+
+
+
diff --git a/graph/incidents_graphml/3/37d1d130-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37d1d130-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..180653b7ecf4e17a250ad8c7591da3e183c5fe9a
--- /dev/null
+++ b/graph/incidents_graphml/3/37d1d130-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.77
+ 100.64.14.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37d1d130-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/37d4ded0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37d4ded0-9cb3-11ed-8977-e596d5530bb8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..269320f4a14e63766fdd1679a4ffd23b23507a5e
--- /dev/null
+++ b/graph/incidents_graphml/3/37d4ded0-9cb3-11ed-8977-e596d5530bb8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.22
+ 100.64.93.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1674652906
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37d4ded0-9cb3-11ed-8977-e596d5530bb8
+
+
+
diff --git a/graph/incidents_graphml/3/37ddf110-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37ddf110-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..444e5b48f34a05ecf14be34d63f0838b0d654708
--- /dev/null
+++ b/graph/incidents_graphml/3/37ddf110-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.181
+ 100.64.16.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437278
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37ddf110-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/37e134f0-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37e134f0-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5430f4e7eb0f310a0fc20fa71b054b049e5a230
--- /dev/null
+++ b/graph/incidents_graphml/3/37e134f0-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.252.127
+ 192.168.252.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.198
+ 100.64.73.198
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.199
+ 100.64.73.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e134f0-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e134f0-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e134f0-2ead-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690703199
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e134f0-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/37e178a0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/37e178a0-3477-11ee-95f5-05a30bfe2201.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f9fa2166be0f152bb0927dc7546b49e18e4b65bf
--- /dev/null
+++ b/graph/incidents_graphml/3/37e178a0-3477-11ee-95f5-05a30bfe2201.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.13
+ 100.64.53.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691339714
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37e178a0-3477-11ee-95f5-05a30bfe2201
+
+
+
diff --git a/graph/incidents_graphml/3/37e6a1e0-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/37e6a1e0-dbb1-11ee-a665-15e5a5884e11.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42252cea1c7a74eda842f3f86042aca42d7a3195
--- /dev/null
+++ b/graph/incidents_graphml/3/37e6a1e0-dbb1-11ee-a665-15e5a5884e11.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.255
+ 100.64.50.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.1
+ 100.64.51.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.1
+ 100.64.51.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.2
+ 100.64.51.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.3
+ 100.64.51.3
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.4
+ 100.64.51.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.130
+ 100.64.7.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.5
+ 100.64.51.5
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.6
+ 100.64.51.6
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.158
+ 100.64.44.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.7
+ 100.64.51.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.157
+ 100.64.17.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.150
+ 100.64.9.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.216
+ HOST-4306
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.8
+ 100.64.51.8
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.9
+ 100.64.51.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.220
+ 100.64.36.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.10
+ 100.64.51.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726468
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e6a1e0-dbb1-11ee-a665-15e5a5884e11
+
+
+
diff --git a/graph/incidents_graphml/3/37e99900-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/37e99900-7c83-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38c141aac2dcd9fd33c1b5814295d19d245fcfb7
--- /dev/null
+++ b/graph/incidents_graphml/3/37e99900-7c83-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.161
+ 100.64.52.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699261351
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37e99900-7c83-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/37e9ea20-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37e9ea20-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e603ebb369d3c413bbb002f035376eb133bf874b
--- /dev/null
+++ b/graph/incidents_graphml/3/37e9ea20-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.64
+ 100.64.78.64
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660860907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e9ea20-1f43-11ed-83f1-1b6fe38c661d
+
+
+ INCIDENT_LINK
+ 1660860907
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37e9ea20-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37eab060-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37eab060-f92f-11ed-8a40-8d257fb4516c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3fdf856bbbd799b852e4f0e33e8cdedd5b9ca06
--- /dev/null
+++ b/graph/incidents_graphml/3/37eab060-f92f-11ed-8a40-8d257fb4516c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.77
+ 100.64.14.77
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821671
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 37eab060-f92f-11ed-8a40-8d257fb4516c
+
+
+
diff --git a/graph/incidents_graphml/3/37eb1070-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37eb1070-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cc645a0d02e51199cd673c9cda1da5bddefe5fd1
--- /dev/null
+++ b/graph/incidents_graphml/3/37eb1070-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.198
+ 100.64.54.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437279
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37eb1070-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/37f052c0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37f052c0-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5714daa20fb2b183b01a64173658f87d99baab5f
--- /dev/null
+++ b/graph/incidents_graphml/3/37f052c0-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.65
+ 100.64.78.65
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660860908
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 37f052c0-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7b13788c2123e064788e5dcc144c04b475b0f41b
--- /dev/null
+++ b/graph/incidents_graphml/3/37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,789 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.222
+ 100.64.71.222
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.21
+ 100.64.81.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.22
+ 100.64.81.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.74.72
+ 100.64.74.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.91
+ 100.64.76.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.222
+ 100.64.75.222
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ USER-0015-1727.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.86
+ 100.64.71.86
+ ["Exploiting Host"]
+ 0.7626953125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.116
+ 100.64.71.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.44.61
+ 100.64.44.61
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.195
+ 100.64.73.195
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.23
+ 100.64.81.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ USER-0015-1622.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.24
+ 100.64.81.24
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.18
+ 100.64.79.18
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/37f81af0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37f81af0-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ddbf9605f961f72700ab778df4bd84aab78ad6c
--- /dev/null
+++ b/graph/incidents_graphml/3/37f81af0-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.65
+ 100.64.78.65
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1660860908
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37f81af0-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37f9b670-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37f9b670-6bec-11ee-af48-5f3b86c59f98.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93915b7f38a695654f744272ba5379d52c9937d5
--- /dev/null
+++ b/graph/incidents_graphml/3/37f9b670-6bec-11ee-af48-5f3b86c59f98.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.198
+ 100.64.54.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697437279
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37f9b670-6bec-11ee-af48-5f3b86c59f98
+
+
+
diff --git a/graph/incidents_graphml/3/37fcfcf0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37fcfcf0-1f43-11ed-83f1-1b6fe38c661d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c139239e6fa0db69dea35cd3b3794a958dc12b07
--- /dev/null
+++ b/graph/incidents_graphml/3/37fcfcf0-1f43-11ed-83f1-1b6fe38c661d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.78.67
+ 100.64.78.67
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660860908
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 37fcfcf0-1f43-11ed-83f1-1b6fe38c661d
+
+
+
diff --git a/graph/incidents_graphml/3/37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8deba12c22d0b4ea7d408ee20b386dc20693bfcb
--- /dev/null
+++ b/graph/incidents_graphml/3/37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.15
+ 100.64.31.15
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.13.216
+ 100.64.13.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.25
+ 100.64.81.25
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199018
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/3800b110-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3800b110-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bdefef561973e5b9cc28fcd6f88bb230b7d8cb0
--- /dev/null
+++ b/graph/incidents_graphml/3/3800b110-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.66
+ 100.64.18.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868459
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3800b110-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/3819aa10-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3819aa10-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..62c7fbb091c99c1dee00e8401da7803b3fc3bc93
--- /dev/null
+++ b/graph/incidents_graphml/3/3819aa10-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.201
+ 100.64.73.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690703200
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3819aa10-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/382afc70-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/382afc70-be91-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7bd2d03f148e6ea839847ccff64fd58d9cadf77
--- /dev/null
+++ b/graph/incidents_graphml/3/382afc70-be91-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.49
+ 100.64.8.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.79.185
+ 100.64.79.185
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382afc70-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382afc70-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382afc70-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382afc70-be91-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/3/382c5c00-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/382c5c00-be91-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e458c2cd933fc0ae5b15bb8136ff8d0ab9c039e5
--- /dev/null
+++ b/graph/incidents_graphml/3/382c5c00-be91-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.65
+ 100.64.72.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382c5c00-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382c5c00-be91-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/3/382dbb90-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/382dbb90-be91-11ed-9416-c54055a72e53.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffe5781d5696b1cd5c11c1e2a05bc82aee30e1b9
--- /dev/null
+++ b/graph/incidents_graphml/3/382dbb90-be91-11ed-9416-c54055a72e53.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.99
+ 100.64.72.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.147
+ 100.64.72.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382dbb90-be91-11ed-9416-c54055a72e53
+
+
+ INCIDENT_LINK
+ 1678376644
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 382dbb90-be91-11ed-9416-c54055a72e53
+
+
+
diff --git a/graph/incidents_graphml/3/38308d70-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/38308d70-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b76b0780b60072d187e0d0723ac76d1593bafb43
--- /dev/null
+++ b/graph/incidents_graphml/3/38308d70-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.201
+ 100.64.73.201
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690703200
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38308d70-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/3833a270-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/3833a270-1472-11ef-94ab-9b572b609cc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ca5bd750c380eb04d28e7063a11de2e46b4efbef
--- /dev/null
+++ b/graph/incidents_graphml/3/3833a270-1472-11ef-94ab-9b572b609cc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.176
+ 100.64.32.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3833a270-1472-11ef-94ab-9b572b609cc3
+
+
+
diff --git a/graph/incidents_graphml/3/383c3da0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/3/383c3da0-ed63-11ec-9115-b3a5268a4818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d0b5cd847bfa88faa279f7a1575c1350bed82b4
--- /dev/null
+++ b/graph/incidents_graphml/3/383c3da0-ed63-11ec-9115-b3a5268a4818.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.4
+ 100.64.72.4
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655377094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 383c3da0-ed63-11ec-9115-b3a5268a4818
+
+
+ INCIDENT_LINK
+ 1655377094
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 383c3da0-ed63-11ec-9115-b3a5268a4818
+
+
+
diff --git a/graph/incidents_graphml/3/38472a70-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/38472a70-1472-11ef-94ab-9b572b609cc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40c32bfa96c10c003c7b764fd9244b6944e5765d
--- /dev/null
+++ b/graph/incidents_graphml/3/38472a70-1472-11ef-94ab-9b572b609cc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.176
+ 100.64.32.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38472a70-1472-11ef-94ab-9b572b609cc3
+
+
+
diff --git a/graph/incidents_graphml/3/384a08e0-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/384a08e0-2ead-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dcb5030b715a021a966a577bbfc8ed76e214119a
--- /dev/null
+++ b/graph/incidents_graphml/3/384a08e0-2ead-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.202
+ 100.64.73.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690703200
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 384a08e0-2ead-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/385420b0-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/385420b0-51fc-11ee-8b1c-f9bbd63a1625.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8213fd29072fcaba2ca586d4dff4dea7f2c6db27
--- /dev/null
+++ b/graph/incidents_graphml/3/385420b0-51fc-11ee-8b1c-f9bbd63a1625.graphml
@@ -0,0 +1,875 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.99
+ 100.64.18.99
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.20
+ USER-0015-1392.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.46
+ 100.64.51.46
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.47
+ 100.64.51.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.48
+ 100.64.51.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.192
+ 100.64.14.192
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.49
+ 100.64.51.49
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.249
+ 100.64.13.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.50
+ 100.64.51.50
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.51
+ 100.64.51.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.73
+ 100.64.19.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.52
+ 100.64.51.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.189
+ 100.64.19.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 385420b0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+
diff --git a/graph/incidents_graphml/3/38579000-7412-11ee-91c2-7545920d3cab.graphml b/graph/incidents_graphml/3/38579000-7412-11ee-91c2-7545920d3cab.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91ae22c14b4f946efe0d577633e7eef08180e15c
--- /dev/null
+++ b/graph/incidents_graphml/3/38579000-7412-11ee-91c2-7545920d3cab.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.29.135
+ 100.64.29.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1698333209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 38579000-7412-11ee-91c2-7545920d3cab
+
+
+
diff --git a/graph/incidents_graphml/3/38584d10-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/38584d10-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d4dfc6202b3d879bb6160137b9385b6a58cd8e5
--- /dev/null
+++ b/graph/incidents_graphml/3/38584d10-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477056
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38584d10-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/38587830-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/3/38587830-ed63-11ec-9115-b3a5268a4818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52d6c1a5c4fd86ab72a4e6e7c7937b4fb75dc59f
--- /dev/null
+++ b/graph/incidents_graphml/3/38587830-ed63-11ec-9115-b3a5268a4818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.112
+ USER-0015-1760.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655377094
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38587830-ed63-11ec-9115-b3a5268a4818
+
+
+
diff --git a/graph/incidents_graphml/3/385a8b60-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/385a8b60-1472-11ef-94ab-9b572b609cc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6ad87333231afae1fecfeeb00a365e3cad799cfd
--- /dev/null
+++ b/graph/incidents_graphml/3/385a8b60-1472-11ef-94ab-9b572b609cc3.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.168
+ 100.64.51.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.181
+ 100.64.31.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.223
+ 100.64.63.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.224
+ 100.64.63.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.225
+ 100.64.63.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.226
+ 100.64.63.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.227
+ 100.64.63.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 385a8b60-1472-11ef-94ab-9b572b609cc3
+
+
+
diff --git a/graph/incidents_graphml/3/386013e0-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/3/386013e0-0948-11ee-899e-3d5be197ab3b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac7021612e96163d71397a575676fb91cf0b7443
--- /dev/null
+++ b/graph/incidents_graphml/3/386013e0-0948-11ee-899e-3d5be197ab3b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.149
+ 100.64.79.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ 100.64.71.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686591628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 386013e0-0948-11ee-899e-3d5be197ab3b
+
+
+ INCIDENT_LINK
+ 1686591628
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 386013e0-0948-11ee-899e-3d5be197ab3b
+
+
+
diff --git a/graph/incidents_graphml/3/3863cb60-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/3/3863cb60-6092-11ee-a31b-270f2d0ccd3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc2626bf6d68823fa1c5fde220269b1ce465af48
--- /dev/null
+++ b/graph/incidents_graphml/3/3863cb60-6092-11ee-a31b-270f2d0ccd3d.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.24
+ 100.64.69.24
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.69.25
+ 100.64.69.25
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696189162
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3863cb60-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189162
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3863cb60-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189162
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3863cb60-6092-11ee-a31b-270f2d0ccd3d
+
+
+ INCIDENT_LINK
+ 1696189162
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3863cb60-6092-11ee-a31b-270f2d0ccd3d
+
+
+
diff --git a/graph/incidents_graphml/3/38647460-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/38647460-51fc-11ee-8b1c-f9bbd63a1625.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..57487e1a449d35de99643d2b58ab935160f3eec7
--- /dev/null
+++ b/graph/incidents_graphml/3/38647460-51fc-11ee-8b1c-f9bbd63a1625.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38647460-51fc-11ee-8b1c-f9bbd63a1625
+
+
+
diff --git a/graph/incidents_graphml/3/38664cd0-3fab-11ee-80ec-e74e3a459676.graphml b/graph/incidents_graphml/3/38664cd0-3fab-11ee-80ec-e74e3a459676.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ec1f0ecce3c4bf25e9c0c64444f37c988c5a048
--- /dev/null
+++ b/graph/incidents_graphml/3/38664cd0-3fab-11ee-80ec-e74e3a459676.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.138
+ 100.64.64.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.34
+ 100.64.43.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.77
+ 100.64.4.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.122
+ 100.64.15.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.33
+ 100.64.12.33
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+ INCIDENT_LINK
+ 1692571511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38664cd0-3fab-11ee-80ec-e74e3a459676
+
+
+
diff --git a/graph/incidents_graphml/3/38680480-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/38680480-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71e756199d354888f4cf56a71296a243cd2bdc1c
--- /dev/null
+++ b/graph/incidents_graphml/3/38680480-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.50
+ 100.64.24.50
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477056
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38680480-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/386b2d30-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/386b2d30-1472-11ef-94ab-9b572b609cc3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a87f8897814ba729b9d57bb10c4dff12f877d16
--- /dev/null
+++ b/graph/incidents_graphml/3/386b2d30-1472-11ef-94ab-9b572b609cc3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1715966627
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 386b2d30-1472-11ef-94ab-9b572b609cc3
+
+
+
diff --git a/graph/incidents_graphml/3/387597a0-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/387597a0-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94e0d1b8ea60f0b8a2fe8dd8fb77e1a43057986a
--- /dev/null
+++ b/graph/incidents_graphml/3/387597a0-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.153
+ 100.64.3.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802615
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 387597a0-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3877fc60-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/3877fc60-51fc-11ee-8b1c-f9bbd63a1625.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c951a19519223440f6b94bb7ff0569ee98bfd60
--- /dev/null
+++ b/graph/incidents_graphml/3/3877fc60-51fc-11ee-8b1c-f9bbd63a1625.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.221
+ 100.64.24.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694585421
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3877fc60-51fc-11ee-8b1c-f9bbd63a1625
+
+
+
diff --git a/graph/incidents_graphml/3/38786ef0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38786ef0-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e80d32c17b46f83a74eda7c77d94d70020ed5c0b
--- /dev/null
+++ b/graph/incidents_graphml/3/38786ef0-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.176
+ 100.64.17.176
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38786ef0-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/387bd560-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/387bd560-27a9-11ee-82e1-59dd32b62381.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79be72f5af674253fe8a34ad36ca2e7cc5b36ce4
--- /dev/null
+++ b/graph/incidents_graphml/3/387bd560-27a9-11ee-82e1-59dd32b62381.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.175
+ USER-0015-1417.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689931824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 387bd560-27a9-11ee-82e1-59dd32b62381
+
+
+
diff --git a/graph/incidents_graphml/3/38883a20-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/3/38883a20-98f7-11ee-8096-1db1b3bdcb7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1ffe69afa745a24dc1e8528f52a9d85b0ae9988
--- /dev/null
+++ b/graph/incidents_graphml/3/38883a20-98f7-11ee-8096-1db1b3bdcb7c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.103
+ 100.64.18.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.20
+ 100.64.68.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702389806
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38883a20-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389806
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38883a20-98f7-11ee-8096-1db1b3bdcb7c
+
+
+
diff --git a/graph/incidents_graphml/3/38912710-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38912710-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a7e9fca993540ade05eaa7b05e0cc928e2c7d7a0
--- /dev/null
+++ b/graph/incidents_graphml/3/38912710-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.36
+ 100.64.18.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194780
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38912710-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/389b9260-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/389b9260-27a9-11ee-82e1-59dd32b62381.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0647630dfcd4f971d05a18823caeb2b7a0419f40
--- /dev/null
+++ b/graph/incidents_graphml/3/389b9260-27a9-11ee-82e1-59dd32b62381.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.175
+ USER-0015-1417.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689931824
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 389b9260-27a9-11ee-82e1-59dd32b62381
+
+
+
diff --git a/graph/incidents_graphml/3/389e6f80-4404-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/3/389e6f80-4404-11ef-b0b5-17c176975c0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..efbacfd937a096e515c988659e8ffa411c915838
--- /dev/null
+++ b/graph/incidents_graphml/3/389e6f80-4404-11ef-b0b5-17c176975c0f.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.141
+ 100.64.50.141
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.73
+ 100.64.28.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.142
+ 100.64.50.142
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.18
+ 100.64.19.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.178
+ 100.64.35.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.143
+ 100.64.50.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.144
+ 100.64.50.144
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.136
+ 100.64.20.136
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.145
+ 100.64.50.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.146
+ 100.64.50.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.147
+ 100.64.50.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 389e6f80-4404-11ef-b0b5-17c176975c0f
+
+
+
diff --git a/graph/incidents_graphml/3/389f09c0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/389f09c0-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77ffd4270aa3bbd3c9c9410148d73b0320db0bb5
--- /dev/null
+++ b/graph/incidents_graphml/3/389f09c0-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.36
+ 100.64.18.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194780
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 389f09c0-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/38ab6670-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/3/38ab6670-fc46-11ec-b1da-11e6c916d75e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f18ee0cc4baa769912efd86a565a1fde6ee9814b
--- /dev/null
+++ b/graph/incidents_graphml/3/38ab6670-fc46-11ec-b1da-11e6c916d75e.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.172
+ 100.64.72.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.76.202
+ 100.64.76.202
+ ["Exploiting Target","Exploiting Host"]
+ 0.88134765625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.79.158
+ USER-0015-1819.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.40
+ USER-0015-1837.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+ INCIDENT_LINK
+ 1657013907
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38ab6670-fc46-11ec-b1da-11e6c916d75e
+
+
+
diff --git a/graph/incidents_graphml/3/38b1bc80-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/3/38b1bc80-3c70-11ee-89e7-7976671c0f18.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edcaf0204523c31129b278cefcc14f51677bd9fe
--- /dev/null
+++ b/graph/incidents_graphml/3/38b1bc80-3c70-11ee-89e7-7976671c0f18.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.58
+ 100.64.59.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1692216318
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b1bc80-3c70-11ee-89e7-7976671c0f18
+
+
+ INCIDENT_LINK
+ 1692216318
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b1bc80-3c70-11ee-89e7-7976671c0f18
+
+
+
diff --git a/graph/incidents_graphml/3/38b8d550-4404-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/3/38b8d550-4404-11ef-b0b5-17c176975c0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac0e8556e63280e0eab7fe87914ea82b164015b9
--- /dev/null
+++ b/graph/incidents_graphml/3/38b8d550-4404-11ef-b0b5-17c176975c0f.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.159
+ 100.64.50.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.160
+ 100.64.50.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b8d550-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b8d550-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b8d550-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b8d550-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b8d550-4404-11ef-b0b5-17c176975c0f
+
+
+ INCIDENT_LINK
+ 1721197039
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38b8d550-4404-11ef-b0b5-17c176975c0f
+
+
+
diff --git a/graph/incidents_graphml/3/38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d6774102c48be8d80c2b995373c4d0717d5b630
--- /dev/null
+++ b/graph/incidents_graphml/3/38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.146
+ 100.64.35.146
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694585422
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625
+
+
+
diff --git a/graph/incidents_graphml/3/38d3e070-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/38d3e070-27a9-11ee-82e1-59dd32b62381.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1f648f91dc36e1f59731e7d4bee4dd11efba307
--- /dev/null
+++ b/graph/incidents_graphml/3/38d3e070-27a9-11ee-82e1-59dd32b62381.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.195
+ 100.64.27.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689931825
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38d3e070-27a9-11ee-82e1-59dd32b62381
+
+
+
diff --git a/graph/incidents_graphml/3/38dc4d90-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/3/38dc4d90-98f7-11ee-8096-1db1b3bdcb7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f71ded08a4cb7ad99fdc42254d634f07364fce1
--- /dev/null
+++ b/graph/incidents_graphml/3/38dc4d90-98f7-11ee-8096-1db1b3bdcb7c.graphml
@@ -0,0 +1,133 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"]
+
+
+ HOST
+ 100.64.69.216
+ 100.64.69.216
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.69.217
+ 100.64.69.217
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1702389807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389807
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c
+
+
+
diff --git a/graph/incidents_graphml/3/38dc6fe0-2d7c-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/3/38dc6fe0-2d7c-11ef-88d9-1fb9581a602f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fb72a27b8d09f5bf886e935bface810ce961fa6
--- /dev/null
+++ b/graph/incidents_graphml/3/38dc6fe0-2d7c-11ef-88d9-1fb9581a602f.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.209.161
+ 172.25.209.161
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.202
+ 100.64.93.202
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.203
+ 100.64.93.203
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.88.133
+ 100.64.88.133
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.204
+ 100.64.93.204
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.140
+ 100.64.91.140
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+ INCIDENT_LINK
+ 1718719702
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f
+
+
+
diff --git a/graph/incidents_graphml/3/38dcb960-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/38dcb960-a2d4-11ee-9cfc-094b81d7b53b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..258ed0e11c10cedec2f50826765d2e7e81ffc651
--- /dev/null
+++ b/graph/incidents_graphml/3/38dcb960-a2d4-11ee-9cfc-094b81d7b53b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.114
+ 100.64.94.114
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.86.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1703474286
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38dcb960-a2d4-11ee-9cfc-094b81d7b53b
+
+
+
diff --git a/graph/incidents_graphml/3/38e444f0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/38e444f0-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..423acb93302409bbb64d905ba6f3ef6e9d66db62
--- /dev/null
+++ b/graph/incidents_graphml/3/38e444f0-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.159
+ 100.64.20.159
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130585
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38e444f0-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/3/38e45020-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38e45020-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbb5169ab1875656028934d3ed641be819f401ef
--- /dev/null
+++ b/graph/incidents_graphml/3/38e45020-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38e45020-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/38e886b0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/3/38e886b0-0c1a-11ee-a535-110da53c9d07.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d78f5d1d55ae6950e68ed94de56fd6656d06ebc
--- /dev/null
+++ b/graph/incidents_graphml/3/38e886b0-0c1a-11ee-a535-110da53c9d07.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.229
+ 100.64.80.229
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686901725
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38e886b0-0c1a-11ee-a535-110da53c9d07
+
+
+ INCIDENT_LINK
+ 1686901725
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38e886b0-0c1a-11ee-a535-110da53c9d07
+
+
+
diff --git a/graph/incidents_graphml/3/38ee47c0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/38ee47c0-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ec0c7bd51cac56b8b87aa91b80a4dc16f1849dd
--- /dev/null
+++ b/graph/incidents_graphml/3/38ee47c0-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.124
+ 100.64.94.124
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706165083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 38ee47c0-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/38ee4bb0-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/38ee4bb0-ace6-11ed-9c58-3fd78e20bcce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2c772b62513dc5a2dea482e51ab6a27cdfe73c9
--- /dev/null
+++ b/graph/incidents_graphml/3/38ee4bb0-ace6-11ed-9c58-3fd78e20bcce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.36.138
+ 100.64.36.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676434031
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 38ee4bb0-ace6-11ed-9c58-3fd78e20bcce
+
+
+
diff --git a/graph/incidents_graphml/3/38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b9f88f51c118c2d5c7612948c985deb524d1708
--- /dev/null
+++ b/graph/incidents_graphml/3/38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.252
+ 100.64.9.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.9746875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194781
+ malicious
+ 0.9746875
+ 0.9746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/38fbb540-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/38fbb540-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..789f522737fdfefaddcd748dbeefd99b7254c6fb
--- /dev/null
+++ b/graph/incidents_graphml/3/38fbb540-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.124
+ 100.64.94.124
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706165083
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 38fbb540-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/38fdf1f0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/38fdf1f0-02ef-11ee-800b-d36f3c94df97.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bb869d1766af7c482578bb2d6ddaacba47edba75
--- /dev/null
+++ b/graph/incidents_graphml/3/38fdf1f0-02ef-11ee-800b-d36f3c94df97.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.156
+ 100.64.76.156
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.40
+ HOST-13966
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.38.176
+ 100.64.38.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.53.227
+ 100.64.53.227
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1685893697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38fdf1f0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38fdf1f0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38fdf1f0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38fdf1f0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38fdf1f0-02ef-11ee-800b-d36f3c94df97
+
+
+ INCIDENT_LINK
+ 1685893697
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 38fdf1f0-02ef-11ee-800b-d36f3c94df97
+
+
+
diff --git a/graph/incidents_graphml/3/3919c850-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/3919c850-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3102fe19fe22efdc7c71e3878d5861f80d985fd3
--- /dev/null
+++ b/graph/incidents_graphml/3/3919c850-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.3
+ 100.64.68.3
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477057
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3919c850-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/392a6a40-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/392a6a40-70fa-11ee-8198-9db2a0bce259.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8805232f14c42df17d3c5ddd9e09f1ae41a01705
--- /dev/null
+++ b/graph/incidents_graphml/3/392a6a40-70fa-11ee-8198-9db2a0bce259.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.79
+ 100.64.48.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697993049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 392a6a40-70fa-11ee-8198-9db2a0bce259
+
+
+ INCIDENT_LINK
+ 1697993049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 392a6a40-70fa-11ee-8198-9db2a0bce259
+
+
+ INCIDENT_LINK
+ 1697993049
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 392a6a40-70fa-11ee-8198-9db2a0bce259
+
+
+
diff --git a/graph/incidents_graphml/3/392b9c80-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/392b9c80-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68cdcbef832028aadc613bd183989b273d5ed688
--- /dev/null
+++ b/graph/incidents_graphml/3/392b9c80-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868461
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 392b9c80-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/392c17d0-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/392c17d0-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e5fb07474962ce61d147f1700c3765adcd458243
--- /dev/null
+++ b/graph/incidents_graphml/3/392c17d0-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.5
+ 100.64.68.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477058
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 392c17d0-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/3939d390-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/3939d390-70fa-11ee-8198-9db2a0bce259.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..470bbb169e756f68a5c63f33bff83ba7e453e1a3
--- /dev/null
+++ b/graph/incidents_graphml/3/3939d390-70fa-11ee-8198-9db2a0bce259.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.160
+ 100.64.43.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697993050
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3939d390-70fa-11ee-8198-9db2a0bce259
+
+
+
diff --git a/graph/incidents_graphml/3/393bc920-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/393bc920-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..29d5b2fcb1c7f588d3862d40d2411e51c01aa404
--- /dev/null
+++ b/graph/incidents_graphml/3/393bc920-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868461
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 393bc920-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/393dcb10-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/393dcb10-5a18-11ee-8c81-27ac3690fef9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d713050991b9ecbab1ff9e6cbf2c0c41ca1e0a0
--- /dev/null
+++ b/graph/incidents_graphml/3/393dcb10-5a18-11ee-8c81-27ac3690fef9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.68.5
+ 100.64.68.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695477058
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 393dcb10-5a18-11ee-8c81-27ac3690fef9
+
+
+
diff --git a/graph/incidents_graphml/3/394b8540-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/394b8540-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8848038bb22c8626f4e0d670db7d441006f6c341
--- /dev/null
+++ b/graph/incidents_graphml/3/394b8540-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.87
+ 100.64.13.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802616
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 394b8540-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/39521680-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/39521680-70fa-11ee-8198-9db2a0bce259.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b3a70cd2cfd8482da824cba82b00f0af230e969
--- /dev/null
+++ b/graph/incidents_graphml/3/39521680-70fa-11ee-8198-9db2a0bce259.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.160
+ 100.64.43.160
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697993050
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 39521680-70fa-11ee-8198-9db2a0bce259
+
+
+
diff --git a/graph/incidents_graphml/3/39559390-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/39559390-27a9-11ee-82e1-59dd32b62381.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2ec4df8ccb42bc8169c7786b03d23c4bbba2279
--- /dev/null
+++ b/graph/incidents_graphml/3/39559390-27a9-11ee-82e1-59dd32b62381.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.137
+ 100.64.24.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689931826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 39559390-27a9-11ee-82e1-59dd32b62381
+
+
+
diff --git a/graph/incidents_graphml/3/3956c430-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/3956c430-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d7f00e9f87a7fc35997aa06eacb16f0fadfdc51
--- /dev/null
+++ b/graph/incidents_graphml/3/3956c430-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.245
+ 100.64.93.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662420842
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3956c430-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/395c4e20-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/395c4e20-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1f2507915d9d6131d3884454aa5acdbde72f500
--- /dev/null
+++ b/graph/incidents_graphml/3/395c4e20-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.87
+ 100.64.13.87
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802616
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 395c4e20-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3960fd60-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/3960fd60-2d73-11ed-b556-77f007f35c82.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a485fb6e06d1b5c85d51f38e2fee914003d6872b
--- /dev/null
+++ b/graph/incidents_graphml/3/3960fd60-2d73-11ed-b556-77f007f35c82.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.93.245
+ 100.64.93.245
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662420842
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3960fd60-2d73-11ed-b556-77f007f35c82
+
+
+
diff --git a/graph/incidents_graphml/3/3983bf00-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3983bf00-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5e729b73725172aae3bf995e88cb396ee869d25
--- /dev/null
+++ b/graph/incidents_graphml/3/3983bf00-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.144
+ 100.64.14.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3983bf00-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/39914dd0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/39914dd0-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ffbf4f6e162a2742ddd019eb9b4ee77fa5dba14b
--- /dev/null
+++ b/graph/incidents_graphml/3/39914dd0-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.161
+ 100.64.20.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130586
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 39914dd0-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/3/399460d0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/399460d0-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbb0eb2320e76b285a6e65195ddac126171cbb6d
--- /dev/null
+++ b/graph/incidents_graphml/3/399460d0-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.144
+ 100.64.14.144
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766317
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 399460d0-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/39998ae0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/39998ae0-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bf0679ebf01f4265c355129ad07faa9e0b19f75
--- /dev/null
+++ b/graph/incidents_graphml/3/39998ae0-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.85
+ 100.64.7.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061832
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 39998ae0-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/399ee260-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/399ee260-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18bdee087992ce1092a45f8493406658431e4b90
--- /dev/null
+++ b/graph/incidents_graphml/3/399ee260-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.161
+ 100.64.20.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130586
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 399ee260-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/3/39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..317bc2f8a5ea4b82e46df61f8e986c5ecffc9d92
--- /dev/null
+++ b/graph/incidents_graphml/3/39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.52
+ 100.64.80.52
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.75.181
+ 100.64.75.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324379
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324379
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/3/39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27530f066ddcb4685832609cfbd4ad53c4c398bf
--- /dev/null
+++ b/graph/incidents_graphml/3/39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.17.170
+ 100.64.17.170
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.71.141
+ 100.64.71.141
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1677324379
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+ INCIDENT_LINK
+ 1677324379
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a
+
+
+
diff --git a/graph/incidents_graphml/3/39ccec20-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/39ccec20-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41b094b4c4801d50fc7b84ad90603bc3f4005a86
--- /dev/null
+++ b/graph/incidents_graphml/3/39ccec20-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.94
+ 100.64.16.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961531
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 39ccec20-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/39d215b0-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/39d215b0-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..807652e27daa2cf806de9003cd5bbfb40081f6dc
--- /dev/null
+++ b/graph/incidents_graphml/3/39d215b0-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.41
+ 100.64.18.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868462
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 39d215b0-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/39d7b300-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/3/39d7b300-0938-11ee-a886-17db84346526.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff2d42bc1338b42ecab3c69aea1f952feb246df2
--- /dev/null
+++ b/graph/incidents_graphml/3/39d7b300-0938-11ee-a886-17db84346526.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.204
+ 100.64.20.204
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.88
+ 100.64.57.88
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.21
+ 100.64.39.21
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686584758
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39d7b300-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584758
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39d7b300-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584758
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39d7b300-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584758
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39d7b300-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584758
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39d7b300-0938-11ee-a886-17db84346526
+
+
+ INCIDENT_LINK
+ 1686584758
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 39d7b300-0938-11ee-a886-17db84346526
+
+
+
diff --git a/graph/incidents_graphml/3/39dca390-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/39dca390-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2911a24c7ad3616a2eaf9969806a25be0ab5e9b
--- /dev/null
+++ b/graph/incidents_graphml/3/39dca390-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.94
+ 100.64.16.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961531
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 39dca390-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/39e3a1e0-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/39e3a1e0-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ee630ff3ea76f024ba2f9d476e64f9ffc82edfd
--- /dev/null
+++ b/graph/incidents_graphml/3/39e3a1e0-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.41
+ 100.64.18.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 39e3a1e0-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/39e7aa40-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/39e7aa40-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e31c8849a0a34875ce71a0af4030993e8f8c3187
--- /dev/null
+++ b/graph/incidents_graphml/3/39e7aa40-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440517
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 39e7aa40-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/39ef94f0-2574-11ed-b617-15360be2351c.graphml b/graph/incidents_graphml/3/39ef94f0-2574-11ed-b617-15360be2351c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ffafe5f713ecdc3da6a07aeb0c14d6f351b9fb8
--- /dev/null
+++ b/graph/incidents_graphml/3/39ef94f0-2574-11ed-b617-15360be2351c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.204
+ 100.64.71.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661541663
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 39ef94f0-2574-11ed-b617-15360be2351c
+
+
+
diff --git a/graph/incidents_graphml/3/39fb0b30-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/39fb0b30-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddb4103b4a8e039527a14a6d2066e7f1b9bc6063
--- /dev/null
+++ b/graph/incidents_graphml/3/39fb0b30-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.105
+ 100.64.60.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440517
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 39fb0b30-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3a001af0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3a001af0-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..068af6fc4afc56f894622921fbd3d84899726c6c
--- /dev/null
+++ b/graph/incidents_graphml/3/3a001af0-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.148
+ 100.64.14.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766318
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a001af0-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3a0587d0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3a0587d0-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0c08b8d0a88835a77e792ca822abf0a43078a14
--- /dev/null
+++ b/graph/incidents_graphml/3/3a0587d0-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.6
+ 100.64.12.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856208
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3a0587d0-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3a0b10c0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3a0b10c0-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbde1fa506db9206e5172f158012c08fca6c54e1
--- /dev/null
+++ b/graph/incidents_graphml/3/3a0b10c0-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.105
+ 100.64.60.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440517
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a0b10c0-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3a0e8ae0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3a0e8ae0-589f-11ee-a130-b3fc4de2b604.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d772cc8e0db541f2c7fa9b9dc65e539083415d85
--- /dev/null
+++ b/graph/incidents_graphml/3/3a0e8ae0-589f-11ee-a130-b3fc4de2b604.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.155.16
+ 172.21.155.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Windows Active Directory","Apache Web Server","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.112
+ 100.64.91.112
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.113
+ 100.64.91.113
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695315139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3a0e8ae0-589f-11ee-a130-b3fc4de2b604
+
+
+ INCIDENT_LINK
+ 1695315139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3a0e8ae0-589f-11ee-a130-b3fc4de2b604
+
+
+ INCIDENT_LINK
+ 1695315139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3a0e8ae0-589f-11ee-a130-b3fc4de2b604
+
+
+ INCIDENT_LINK
+ 1695315139
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3a0e8ae0-589f-11ee-a130-b3fc4de2b604
+
+
+
diff --git a/graph/incidents_graphml/3/3a1c7c90-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3a1c7c90-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae44452fa491714af269107744aa6e3d2e53fb0a
--- /dev/null
+++ b/graph/incidents_graphml/3/3a1c7c90-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.149
+ 100.64.14.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766318
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a1c7c90-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3a1e3ff0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3a1e3ff0-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b41ff28688a15e39a906c3000b32755cc121b3b8
--- /dev/null
+++ b/graph/incidents_graphml/3/3a1e3ff0-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.6
+ 100.64.12.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856208
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a1e3ff0-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6684143b98440d0eb88c815f18289729800fe66a
--- /dev/null
+++ b/graph/incidents_graphml/3/3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.89
+ 100.64.13.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802618
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3a310820-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/3/3a310820-98f7-11ee-8096-1db1b3bdcb7c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..023f4adfd614d98cd2234a1cceecec94ab19a3bb
--- /dev/null
+++ b/graph/incidents_graphml/3/3a310820-98f7-11ee-8096-1db1b3bdcb7c.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.246
+ 100.64.28.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1702389809
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a310820-98f7-11ee-8096-1db1b3bdcb7c
+
+
+ INCIDENT_LINK
+ 1702389809
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a310820-98f7-11ee-8096-1db1b3bdcb7c
+
+
+
diff --git a/graph/incidents_graphml/3/3a318480-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3a318480-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2216ab3ae7ef58a6633654c1bc2b521bfcf239c6
--- /dev/null
+++ b/graph/incidents_graphml/3/3a318480-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.71
+ 100.64.51.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440517
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a318480-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3a35b560-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3a35b560-2f33-11ee-873f-bf8b02b45a54.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ab516daf1261efaf07433a9b9e6cd779a5deaba8
--- /dev/null
+++ b/graph/incidents_graphml/3/3a35b560-2f33-11ee-873f-bf8b02b45a54.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.40
+ 100.64.38.40
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.128
+ 100.64.71.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.31.248
+ 100.64.31.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.48
+ 100.64.82.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.49
+ 100.64.82.49
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+ INCIDENT_LINK
+ 1690760756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a35b560-2f33-11ee-873f-bf8b02b45a54
+
+
+
diff --git a/graph/incidents_graphml/3/3a377ea0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3a377ea0-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..85434ac0aa8400e010a27a55582aa7dd52c30ef0
--- /dev/null
+++ b/graph/incidents_graphml/3/3a377ea0-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.152
+ 100.64.14.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766319
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a377ea0-006f-11ef-9e1d-8b16c75f4754
+
+
+ INCIDENT_LINK
+ 1713766319
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a377ea0-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b688d5840becfc0f64f7d01ecffe3458b570f17
--- /dev/null
+++ b/graph/incidents_graphml/3/3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.251
+ 100.64.93.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704115098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98b6615076da8ec109d36c2b0f4341bae4926550
--- /dev/null
+++ b/graph/incidents_graphml/3/3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.93.251
+ 100.64.93.251
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704115098
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3a56ef80-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3a56ef80-7c83-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95138d6ba295a5ce2f2f4be2128fecc3655e8871
--- /dev/null
+++ b/graph/incidents_graphml/3/3a56ef80-7c83-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.163
+ 100.64.52.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699261355
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a56ef80-7c83-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/3a5b39b0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a5b39b0-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a6db43122393d32f227c5f4a135ebcaa27d0326
--- /dev/null
+++ b/graph/incidents_graphml/3/3a5b39b0-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.95.226
+ 100.64.95.226
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659730047
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a5b39b0-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27705585936973f33b3f4e96602c61d10d094292
--- /dev/null
+++ b/graph/incidents_graphml/3/3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.38
+ 100.64.18.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/3a61f070-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a61f070-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ec1da4fd2c3709fac13061cb18437071b3ab08c
--- /dev/null
+++ b/graph/incidents_graphml/3/3a61f070-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.121
+ 100.64.92.121
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659730047
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a61f070-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3a6d3b10-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a6d3b10-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50f1093692a890cd4d2c2c65c377c24beadc0db2
--- /dev/null
+++ b/graph/incidents_graphml/3/3a6d3b10-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.121
+ 100.64.92.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659730047
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a6d3b10-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8ebef90c043171668bf8073e224a3f0e41f0c47
--- /dev/null
+++ b/graph/incidents_graphml/3/3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.38
+ 100.64.18.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194783
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/3a769810-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3a769810-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..864be90f34aae729a6b717144178ccdbfd46e9b8
--- /dev/null
+++ b/graph/incidents_graphml/3/3a769810-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.179
+ 100.64.15.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597083
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a769810-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3a772620-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a772620-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56f0cda057b5943d23c66b17c6be7e8c650273d8
--- /dev/null
+++ b/graph/incidents_graphml/3/3a772620-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659730047
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a772620-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3a7867d0-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3a7867d0-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d5ed2592bd3d2f520e06dfb389283bd783857fd
--- /dev/null
+++ b/graph/incidents_graphml/3/3a7867d0-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.180
+ 100.64.8.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868463
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3a7867d0-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/3a8975a0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a8975a0-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc1ee8e7ff56b08bcdc41b28b880d4dca4d65fe6
--- /dev/null
+++ b/graph/incidents_graphml/3/3a8975a0-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659730047
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a8975a0-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3a8baa30-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/3/3a8baa30-94e4-11ee-b216-b792b1d50feb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d23bcbd53560b65a408a67ec6749f73801381bd7
--- /dev/null
+++ b/graph/incidents_graphml/3/3a8baa30-94e4-11ee-b216-b792b1d50feb.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.177
+ 100.64.8.177
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.99
+ 100.64.26.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.100
+ 100.64.26.100
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.114
+ 100.64.8.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.149
+ 100.64.8.149
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.101
+ 100.64.26.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.221
+ 100.64.13.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.102
+ 100.64.26.102
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.103
+ 100.64.26.103
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.144
+ 100.64.20.144
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.80
+ 100.64.18.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.104
+ USER-0015-1261.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.105
+ 100.64.26.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.106
+ 100.64.26.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.107
+ 100.64.26.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.108
+ 100.64.26.108
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.109
+ 100.64.26.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+ INCIDENT_LINK
+ 1701941845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3a8baa30-94e4-11ee-b216-b792b1d50feb
+
+
+
diff --git a/graph/incidents_graphml/3/3a925d70-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3a925d70-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..48ade38f28819644a5e3d1a4103adf4cfd5e41dd
--- /dev/null
+++ b/graph/incidents_graphml/3/3a925d70-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.179
+ 100.64.15.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597084
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3a925d70-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3ab3d3e0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ab3d3e0-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5268021641ce5cb36c59ddbb2a7b9853ef72cf1d
--- /dev/null
+++ b/graph/incidents_graphml/3/3ab3d3e0-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.59.107
+ 100.64.59.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440518
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ab3d3e0-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3ab825c0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3ab825c0-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96d14f80655295d3272e594c8ebc0cfaaed59b1e
--- /dev/null
+++ b/graph/incidents_graphml/3/3ab825c0-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.48
+ 100.64.9.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194784
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab825c0-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/3ab9f200-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/3ab9f200-11b9-11ed-a4c1-252f95debd7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adc6cb340445d10b52b22ff3d63efbcd136f8373
--- /dev/null
+++ b/graph/incidents_graphml/3/3ab9f200-11b9-11ed-a4c1-252f95debd7b.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.248
+ 100.64.80.248
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.7.228
+ 100.64.7.228
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.249
+ 100.64.80.249
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.80
+ 100.64.77.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.40
+ 100.64.71.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ab9f200-11b9-11ed-a4c1-252f95debd7b
+
+
+
diff --git a/graph/incidents_graphml/3/3abbc6c0-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/3abbc6c0-11b9-11ed-a4c1-252f95debd7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..608ad6a285eb9f80c058268926b4d5b6a6b3702e
--- /dev/null
+++ b/graph/incidents_graphml/3/3abbc6c0-11b9-11ed-a4c1-252f95debd7b.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.250
+ 100.64.80.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.251
+ 100.64.80.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.90
+ 100.64.71.90
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.252
+ 100.64.80.252
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.253
+ 100.64.80.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+ INCIDENT_LINK
+ 1659372277
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3abbc6c0-11b9-11ed-a4c1-252f95debd7b
+
+
+
diff --git a/graph/incidents_graphml/3/3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea2b297557e7fdfd4ec41e5a86b96563b8f57819
--- /dev/null
+++ b/graph/incidents_graphml/3/3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.253
+ 100.64.93.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704115098
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3ac5ae30-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ac5ae30-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9ed8c22f6b8f29f11ba2df0379fdc44c5328b02
--- /dev/null
+++ b/graph/incidents_graphml/3/3ac5ae30-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.59.107
+ 100.64.59.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440518
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ac5ae30-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3ac8c790-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3ac8c790-7be8-11ee-b619-8bfdf25c0d9a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16c367794aabf4ee433505361ec06c4fe5c38ce9
--- /dev/null
+++ b/graph/incidents_graphml/3/3ac8c790-7be8-11ee-b619-8bfdf25c0d9a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.48
+ 100.64.9.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699194784
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ac8c790-7be8-11ee-b619-8bfdf25c0d9a
+
+
+
diff --git a/graph/incidents_graphml/3/3ad35790-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3ad35790-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ba156790dc0bf33000c584ccb5db03975f83776a
--- /dev/null
+++ b/graph/incidents_graphml/3/3ad35790-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.221
+ 100.64.26.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685077656
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ad35790-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3ad565a0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ad565a0-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54d7faa1193cfc60453bf9d7623c9c52b0b84739
--- /dev/null
+++ b/graph/incidents_graphml/3/3ad565a0-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.107
+ 100.64.60.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440518
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ad565a0-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19f2c3f65b3060fa4ccfbd86b9ca88cd0266ee34
--- /dev/null
+++ b/graph/incidents_graphml/3/3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.93.253
+ 100.64.93.253
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704115099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3d8f0d1dc7bbfa49cc519fb0e52223b050fe0d6
--- /dev/null
+++ b/graph/incidents_graphml/3/3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.6
+ USER-0015-2109.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1704115099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3ae62e80-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ae62e80-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4159e5f0e3becdb9a3b25793b82c66c9ea6be139
--- /dev/null
+++ b/graph/incidents_graphml/3/3ae62e80-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.107
+ 100.64.60.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440519
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ae62e80-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3ae66030-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3ae66030-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50af6899d554bb506450484112a1767aada47e6b
--- /dev/null
+++ b/graph/incidents_graphml/3/3ae66030-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.165
+ 100.64.58.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799218
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ae66030-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/3/3aec84e0-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3aec84e0-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e65990634ded27579395e03fb8108693a3f6db93
--- /dev/null
+++ b/graph/incidents_graphml/3/3aec84e0-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.26.221
+ 100.64.26.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685077656
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3aec84e0-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3af04e50-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/3af04e50-463d-11ed-9048-e52ef683aaf1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb0b30c337fd22821cccd7309344a22ee74079b7
--- /dev/null
+++ b/graph/incidents_graphml/3/3af04e50-463d-11ed-9048-e52ef683aaf1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.173
+ 100.64.81.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1665146431
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3af04e50-463d-11ed-9048-e52ef683aaf1
+
+
+
diff --git a/graph/incidents_graphml/3/3af48660-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3af48660-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3259047aec9caac68365bbd40ac135c3b33de97
--- /dev/null
+++ b/graph/incidents_graphml/3/3af48660-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.60.111
+ 100.64.60.111
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440519
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3af48660-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3af8b2c0-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/3af8b2c0-463d-11ed-9048-e52ef683aaf1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3a48a7c85d4dcc402ec32e31f64b113dc74fece4
--- /dev/null
+++ b/graph/incidents_graphml/3/3af8b2c0-463d-11ed-9048-e52ef683aaf1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.81.173
+ 100.64.81.173
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1665146431
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3af8b2c0-463d-11ed-9048-e52ef683aaf1
+
+
+
diff --git a/graph/incidents_graphml/3/3af9de10-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3af9de10-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fee0cf052d58a434da7425d8597e39154e99b40a
--- /dev/null
+++ b/graph/incidents_graphml/3/3af9de10-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.31.6
+ USER-0015-2109.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704115099
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3af9de10-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3afaa500-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3afaa500-21eb-11ee-a8c2-a10defe0b4b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d50a86be1b3f334600a4d276876a7a794f6925d
--- /dev/null
+++ b/graph/incidents_graphml/3/3afaa500-21eb-11ee-a8c2-a10defe0b4b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300468
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3afaa500-21eb-11ee-a8c2-a10defe0b4b5
+
+
+
diff --git a/graph/incidents_graphml/3/3b03efb0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3b03efb0-3e7a-11ee-bf13-37e75aa85278.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70e4ff9cbf90ba28854a9e2277ddd20ce3187625
--- /dev/null
+++ b/graph/incidents_graphml/3/3b03efb0-3e7a-11ee-bf13-37e75aa85278.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.111
+ 100.64.60.111
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692440519
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b03efb0-3e7a-11ee-bf13-37e75aa85278
+
+
+
diff --git a/graph/incidents_graphml/3/3b0913c0-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3b0913c0-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce55473f700359afc28d63b2e38f98e14656d654
--- /dev/null
+++ b/graph/incidents_graphml/3/3b0913c0-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.91
+ 100.64.13.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802619
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b0913c0-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3b0db730-e31f-11ee-acbf-dfdefbfef3c0.graphml b/graph/incidents_graphml/3/3b0db730-e31f-11ee-acbf-dfdefbfef3c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e6bed3396cf1069e89db9fd3fec1f6d47d870d58
--- /dev/null
+++ b/graph/incidents_graphml/3/3b0db730-e31f-11ee-acbf-dfdefbfef3c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.226
+ 100.64.68.226
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","Okta","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1710543376
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b0db730-e31f-11ee-acbf-dfdefbfef3c0
+
+
+
diff --git a/graph/incidents_graphml/3/3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0571a748578595eda192a70314430c199f4d1289
--- /dev/null
+++ b/graph/incidents_graphml/3/3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.208
+ 100.64.11.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ INCIDENT_LINK
+ 1704115099
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3b139070-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/3/3b139070-540d-11ee-99ed-211c2b4ec819.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e1c3d5565c7efa66ee24add802435de9c878e49
--- /dev/null
+++ b/graph/incidents_graphml/3/3b139070-540d-11ee-99ed-211c2b4ec819.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.93.136
+ 100.64.93.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694812629
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b139070-540d-11ee-99ed-211c2b4ec819
+
+
+
diff --git a/graph/incidents_graphml/3/3b147200-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/3/3b147200-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9febc63eabeb74d74c62e97edf23877ad114df22
--- /dev/null
+++ b/graph/incidents_graphml/3/3b147200-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.254
+ 100.64.38.254
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971315
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b147200-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/3/3b19b590-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3b19b590-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be9bf989ecee5c795fc50c4f8c978b80c9957852
--- /dev/null
+++ b/graph/incidents_graphml/3/3b19b590-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.91
+ 100.64.13.91
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802619
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b19b590-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3b1d3960-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b1d3960-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c857d0b8d048b7928a06a2198760d06e7d13153e
--- /dev/null
+++ b/graph/incidents_graphml/3/3b1d3960-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.8
+ 100.64.12.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856209
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b1d3960-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b208700-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3b208700-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e1fbf519e68aec47e5ed6aa5f28c6b7fb3d9132
--- /dev/null
+++ b/graph/incidents_graphml/3/3b208700-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.83
+ 100.64.10.83
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821677
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b208700-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3b222da0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/3/3b222da0-82f8-11ee-9f73-dbbba1248bb5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d05269e2985772bf5e4924f2635f0baaa5bc416a
--- /dev/null
+++ b/graph/incidents_graphml/3/3b222da0-82f8-11ee-9f73-dbbba1248bb5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.1
+ 100.64.39.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699971315
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b222da0-82f8-11ee-9f73-dbbba1248bb5
+
+
+
diff --git a/graph/incidents_graphml/3/3b2389c0-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3b2389c0-21eb-11ee-a8c2-a10defe0b4b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cad58deb0774d8cbb7410952c82fc90d9020853c
--- /dev/null
+++ b/graph/incidents_graphml/3/3b2389c0-21eb-11ee-a8c2-a10defe0b4b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.24
+ 100.64.21.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300469
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b2389c0-21eb-11ee-a8c2-a10defe0b4b5
+
+
+
diff --git a/graph/incidents_graphml/3/3b2ad930-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3b2ad930-65f9-11ee-b910-4dbb90e8cc17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..098e55ad4129ce8cd7b68af24c65cfd7d8770ccc
--- /dev/null
+++ b/graph/incidents_graphml/3/3b2ad930-65f9-11ee-b910-4dbb90e8cc17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.123
+ 100.64.27.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696783160
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b2ad930-65f9-11ee-b910-4dbb90e8cc17
+
+
+
diff --git a/graph/incidents_graphml/3/3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bcfe7715f20cebf7b603b27dc62f988e6c5557da
--- /dev/null
+++ b/graph/incidents_graphml/3/3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.163
+ 100.64.20.163
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130589
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/3/3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d4f4be5a5cbe8ad5b1972dcd5ac37f0b047af526
--- /dev/null
+++ b/graph/incidents_graphml/3/3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ USER-0015-1039.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.11.208
+ 100.64.11.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1704115099
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3b357c50-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b357c50-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5ed9b0044a09b4e7c22588e0a2f16cbd0fa64917
--- /dev/null
+++ b/graph/incidents_graphml/3/3b357c50-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.8
+ 100.64.12.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b357c50-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b35dbd0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3b35dbd0-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79d6ecd71c5b73c371fdf839e2b3925a2e1e4805
--- /dev/null
+++ b/graph/incidents_graphml/3/3b35dbd0-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.154
+ 100.64.14.154
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766320
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b35dbd0-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3b3b53f0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3b3b53f0-65f9-11ee-b910-4dbb90e8cc17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c75434dd6d388b49f9b66810f1a415e45a9924d2
--- /dev/null
+++ b/graph/incidents_graphml/3/3b3b53f0-65f9-11ee-b910-4dbb90e8cc17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.123
+ 100.64.27.123
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696783161
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b3b53f0-65f9-11ee-b910-4dbb90e8cc17
+
+
+
diff --git a/graph/incidents_graphml/3/3b3d0200-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/3b3d0200-4dd9-11ee-b3c2-8d33e6517b90.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9a328b2cc747625076ee57e86e47f857a2e4391
--- /dev/null
+++ b/graph/incidents_graphml/3/3b3d0200-4dd9-11ee-b3c2-8d33e6517b90.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.163
+ 100.64.20.163
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694130589
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b3d0200-4dd9-11ee-b3c2-8d33e6517b90
+
+
+
diff --git a/graph/incidents_graphml/3/3b436dc0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/3/3b436dc0-0c5d-11ed-b597-112eae6df069.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae1a151e22aed23822520620a2581856d4f33d5a
--- /dev/null
+++ b/graph/incidents_graphml/3/3b436dc0-0c5d-11ed-b597-112eae6df069.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.120
+ 100.64.78.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.3.124
+ 100.64.3.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.121
+ 100.64.78.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783008
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b436dc0-0c5d-11ed-b597-112eae6df069
+
+
+
diff --git a/graph/incidents_graphml/3/3b43fb40-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b43fb40-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2d77c6249f0597a7ed66a198c336c04801e1410
--- /dev/null
+++ b/graph/incidents_graphml/3/3b43fb40-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.14
+ 100.64.12.14
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b43fb40-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b4800f0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3b4800f0-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46979fb1542db6aa3d265b3228c7f073f652e93b
--- /dev/null
+++ b/graph/incidents_graphml/3/3b4800f0-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.25
+ 100.64.2.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685210371
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b4800f0-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/3b487970-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3b487970-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..163b034456d8a6ce4fbc971ca7f1735567f17e13
--- /dev/null
+++ b/graph/incidents_graphml/3/3b487970-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.154
+ 100.64.14.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766320
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b487970-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3b4984c0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3b4984c0-65f9-11ee-b910-4dbb90e8cc17.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e845d7725c0535a0371ba47493e0dc667840fd30
--- /dev/null
+++ b/graph/incidents_graphml/3/3b4984c0-65f9-11ee-b910-4dbb90e8cc17.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.48.81
+ USER-0015-2095.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696783161
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b4984c0-65f9-11ee-b910-4dbb90e8cc17
+
+
+
diff --git a/graph/incidents_graphml/3/3b52c850-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b52c850-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16ea0c9c3bab3b910acf32526176c991621cfc3e
--- /dev/null
+++ b/graph/incidents_graphml/3/3b52c850-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.14
+ 100.64.12.14
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b52c850-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b5348d0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3b5348d0-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f8c43a477fd0e1c908fc2a5b6c781bfddece988
--- /dev/null
+++ b/graph/incidents_graphml/3/3b5348d0-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.87
+ 100.64.7.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061835
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b5348d0-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3b605ce0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b605ce0-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82dbf77348b7dc05ea3790fed23eda08f9f9ea6e
--- /dev/null
+++ b/graph/incidents_graphml/3/3b605ce0-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.9
+ 100.64.12.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b605ce0-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..30437c4d72ffa01065a96acc7f2b43eccde2dff7
--- /dev/null
+++ b/graph/incidents_graphml/3/3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.2.25
+ 100.64.2.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685210372
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/3b6daea0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3b6daea0-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e50acd17490f69e196b5686cb9cbeaa803d00b7d
--- /dev/null
+++ b/graph/incidents_graphml/3/3b6daea0-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.87
+ 100.64.7.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061835
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b6daea0-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3b6f5100-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b6f5100-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b1bd23df3b26cc4344929ae2f854273b0015419
--- /dev/null
+++ b/graph/incidents_graphml/3/3b6f5100-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.9
+ 100.64.12.9
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b6f5100-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b6f87e0-0494-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3b6f87e0-0494-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de2393caf9ab6155155c36387b4cfe86cec39ab4
--- /dev/null
+++ b/graph/incidents_graphml/3/3b6f87e0-0494-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.204
+ 100.64.38.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686074519
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b6f87e0-0494-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3b768460-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/3/3b768460-30ed-11ef-bae8-75e6361c756f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccaf6838a7be127b91842701630dcddff1333df5
--- /dev/null
+++ b/graph/incidents_graphml/3/3b768460-30ed-11ef-bae8-75e6361c756f.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.23
+ 100.64.15.23
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.63
+ 100.64.53.63
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.197
+ 100.64.7.197
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.53.64
+ 100.64.53.64
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+ INCIDENT_LINK
+ 1719098093
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b768460-30ed-11ef-bae8-75e6361c756f
+
+
+
diff --git a/graph/incidents_graphml/3/3b7d7410-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3b7d7410-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e707ce9a1187f461c70be88100a98fa5addc4981
--- /dev/null
+++ b/graph/incidents_graphml/3/3b7d7410-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.85
+ 100.64.10.85
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821677
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3b7d7410-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3b7da8e0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b7da8e0-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0379a8b4aac5707f05daf5bd03008806c43c4c8b
--- /dev/null
+++ b/graph/incidents_graphml/3/3b7da8e0-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.16
+ 100.64.12.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b7da8e0-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b879a60-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/3/3b879a60-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f2268ed0da6bfa66090a29203f705bfed0cbef8a
--- /dev/null
+++ b/graph/incidents_graphml/3/3b879a60-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.200
+ 100.64.58.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038047
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b879a60-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/3/3b8dae70-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b8dae70-81ec-11ee-a529-e575d13068e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..828c51df255a36e3b5616a3d19d30c360d9e23e3
--- /dev/null
+++ b/graph/incidents_graphml/3/3b8dae70-81ec-11ee-a529-e575d13068e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.16
+ 100.64.12.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699856210
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3b8dae70-81ec-11ee-a529-e575d13068e1
+
+
+
diff --git a/graph/incidents_graphml/3/3b8dde90-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/3/3b8dde90-7437-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f337ea802932d447e2a3dfce2f3becb4fa0a4f0
--- /dev/null
+++ b/graph/incidents_graphml/3/3b8dde90-7437-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.138
+ 100.64.71.138
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.139
+ 100.64.71.139
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1670201608
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b8dde90-7437-11ed-85ba-bb75aa2d6818
+
+
+ INCIDENT_LINK
+ 1670201608
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b8dde90-7437-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/3/3b978140-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3b978140-21eb-11ee-a8c2-a10defe0b4b5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ec9866272f405952561c84c79142fc0ccba54fa
--- /dev/null
+++ b/graph/incidents_graphml/3/3b978140-21eb-11ee-a8c2-a10defe0b4b5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.34
+ 100.64.30.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300469
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b978140-21eb-11ee-a8c2-a10defe0b4b5
+
+
+
diff --git a/graph/incidents_graphml/3/3b9e90a0-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3b9e90a0-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7dd4a69f12566c6d5445c2f21b770e5c8bc5c501
--- /dev/null
+++ b/graph/incidents_graphml/3/3b9e90a0-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.85
+ 100.64.10.85
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821677
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3b9e90a0-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3b9f0d80-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3b9f0d80-548f-11ee-81a7-334be12fd476.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..baa8746e27ca4fa6750ae69589a29ea76d616071
--- /dev/null
+++ b/graph/incidents_graphml/3/3b9f0d80-548f-11ee-81a7-334be12fd476.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.68
+ 100.64.18.68
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694868465
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3b9f0d80-548f-11ee-81a7-334be12fd476
+
+
+
diff --git a/graph/incidents_graphml/3/3ba1eda0-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3ba1eda0-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..21251a7010b7da9df3a08dbce88a229b0bc153d2
--- /dev/null
+++ b/graph/incidents_graphml/3/3ba1eda0-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.128
+ 100.64.49.128
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927929
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3ba1eda0-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3ba2a5d0-0494-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3ba2a5d0-0494-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78121bfd8ae28327f0dd4afe3af8a8b3cacb2ae2
--- /dev/null
+++ b/graph/incidents_graphml/3/3ba2a5d0-0494-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.206
+ 100.64.38.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686074519
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ba2a5d0-0494-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3ba4cda0-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/3/3ba4cda0-a8b4-11ee-bb9e-f554981233b0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a0a112a205834eef7530ba41e03dd8d9e063226
--- /dev/null
+++ b/graph/incidents_graphml/3/3ba4cda0-a8b4-11ee-bb9e-f554981233b0.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.143
+ 100.64.26.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.53
+ 100.64.68.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Protect","CASB"]
+
+
+ INCIDENT_LINK
+ 1704120254
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ba4cda0-a8b4-11ee-bb9e-f554981233b0
+
+
+ INCIDENT_LINK
+ 1704120254
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ba4cda0-a8b4-11ee-bb9e-f554981233b0
+
+
+
diff --git a/graph/incidents_graphml/3/3bacd5a0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/3/3bacd5a0-1f88-11ee-b26a-cbff99af2cd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..db01864515d2363bd985e382fdae86b688da8486
--- /dev/null
+++ b/graph/incidents_graphml/3/3bacd5a0-1f88-11ee-b26a-cbff99af2cd4.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.200
+ 100.64.58.200
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689038047
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3bacd5a0-1f88-11ee-b26a-cbff99af2cd4
+
+
+
diff --git a/graph/incidents_graphml/3/3bb066f0-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bb066f0-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c526c889b94c10613aa27a453fe9f3c8c82952da
--- /dev/null
+++ b/graph/incidents_graphml/3/3bb066f0-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.182
+ 100.64.25.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bb066f0-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/3/3bb73cc0-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3bb73cc0-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..95921209f815c3d8f5584b5c59528a1be0d1513f
--- /dev/null
+++ b/graph/incidents_graphml/3/3bb73cc0-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.134
+ 100.64.12.134
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3bb73cc0-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3bc38da0-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3bc38da0-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c31a724408fb75b3a336f94a1aebe99f3a5ca453
--- /dev/null
+++ b/graph/incidents_graphml/3/3bc38da0-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.29
+ 100.64.81.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.21
+ USER-0015-1611.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bc38da0-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bc38da0-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/3/3bc59ca0-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bc59ca0-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40af984e26f9169985d6b2d072ec9a46d03ef05d
--- /dev/null
+++ b/graph/incidents_graphml/3/3bc59ca0-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.182
+ 100.64.25.182
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799219
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3bc59ca0-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/3/3bca1d50-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3bca1d50-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51b9376ec00abd3cfe77ae32a0238edd6c009c75
--- /dev/null
+++ b/graph/incidents_graphml/3/3bca1d50-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.30
+ 100.64.81.30
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.232
+ 100.64.71.232
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bca1d50-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bca1d50-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/3/3bcb6d00-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3bcb6d00-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98f0a19b2443afba3bfe5df10ae40e2474f9e030
--- /dev/null
+++ b/graph/incidents_graphml/3/3bcb6d00-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.87
+ 100.64.10.87
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bcb6d00-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3bd2df20-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3bd2df20-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66a1ea65a0320125b8b0160704d067c787d99e71
--- /dev/null
+++ b/graph/incidents_graphml/3/3bd2df20-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.4.216
+ 100.64.4.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713766321
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3bd2df20-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3bd32aa0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/3/3bd32aa0-0c5d-11ed-b597-112eae6df069.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16d95c4d555eac34aa43ecb5e4761b66151f0f77
--- /dev/null
+++ b/graph/incidents_graphml/3/3bd32aa0-0c5d-11ed-b597-112eae6df069.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.122
+ 100.64.78.122
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.18
+ USER-0015-1780.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1658783009
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3bd32aa0-0c5d-11ed-b597-112eae6df069
+
+
+ INCIDENT_LINK
+ 1658783009
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3bd32aa0-0c5d-11ed-b597-112eae6df069
+
+
+
diff --git a/graph/incidents_graphml/3/3bd4cbb0-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3bd4cbb0-f25b-11ec-b513-c302b572dea2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2dd8c57dd263deccff332225501eb58274eac955
--- /dev/null
+++ b/graph/incidents_graphml/3/3bd4cbb0-f25b-11ec-b513-c302b572dea2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.31
+ 100.64.81.31
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.81.1
+ 100.64.81.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655923420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd4cbb0-f25b-11ec-b513-c302b572dea2
+
+
+ INCIDENT_LINK
+ 1655923420
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd4cbb0-f25b-11ec-b513-c302b572dea2
+
+
+
diff --git a/graph/incidents_graphml/3/3bd7c510-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bd7c510-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..606ffe2798af8ba018a040003f210211f6cb0fde
--- /dev/null
+++ b/graph/incidents_graphml/3/3bd7c510-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799219
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd7c510-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/3/3bd9fc20-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/3bd9fc20-dbb1-11ee-a665-15e5a5884e11.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81e26d769a8ec57b2200010f057db0a52ab7fd07
--- /dev/null
+++ b/graph/incidents_graphml/3/3bd9fc20-dbb1-11ee-a665-15e5a5884e11.graphml
@@ -0,0 +1,337 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.22
+ 100.64.51.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.23
+ 100.64.51.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.24
+ 100.64.51.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.25
+ 100.64.51.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.26
+ 100.64.51.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.27
+ 100.64.51.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+ INCIDENT_LINK
+ 1709726475
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3bd9fc20-dbb1-11ee-a665-15e5a5884e11
+
+
+
diff --git a/graph/incidents_graphml/3/3be72a70-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3be72a70-006f-11ef-9e1d-8b16c75f4754.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b60b6c2c4f7b821be46b043c554fe3bf1fcc1aa6
--- /dev/null
+++ b/graph/incidents_graphml/3/3be72a70-006f-11ef-9e1d-8b16c75f4754.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.216
+ 100.64.4.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1713766321
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3be72a70-006f-11ef-9e1d-8b16c75f4754
+
+
+
diff --git a/graph/incidents_graphml/3/3be8b900-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3be8b900-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a2592ee724ae436af251189c0bf1d2218d80b640
--- /dev/null
+++ b/graph/incidents_graphml/3/3be8b900-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.87
+ 100.64.10.87
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1684821678
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3be8b900-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3bee5a50-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bee5a50-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..84401d193ff6395fc7653f7b867221d3c736a8bb
--- /dev/null
+++ b/graph/incidents_graphml/3/3bee5a50-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.54
+ 100.64.39.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799219
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3bee5a50-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/3/3bef96e0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3bef96e0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54c6fc96c20f152b8844ab81557c6ab3aae6e1cc
--- /dev/null
+++ b/graph/incidents_graphml/3/3bef96e0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.232
+ 100.64.22.232
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300899
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3bef96e0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/3/3bf7ed40-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3bf7ed40-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64c6a02d1f6286dee64210748fd292800cc4792d
--- /dev/null
+++ b/graph/incidents_graphml/3/3bf7ed40-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.89
+ 100.64.7.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061836
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3bf7ed40-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4825aa1b72cc8a4c0de8ba601e08fcd5d1ff8128
--- /dev/null
+++ b/graph/incidents_graphml/3/3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.19.248
+ USER-0015-1221.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1704115100
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3c043040-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3c043040-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb084de7eff66a7a68b64503c2b22e1822f5b4c9
--- /dev/null
+++ b/graph/incidents_graphml/3/3c043040-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c043040-f92f-11ed-ab43-ff746e796bda
+
+
+ INCIDENT_LINK
+ 1684821678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c043040-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3c090640-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c090640-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4b1cf1f8c2d28d79370ec373049748318870e38
--- /dev/null
+++ b/graph/incidents_graphml/3/3c090640-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.46
+ 100.64.11.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3c090640-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d21a43463ea965b64b903e1a5784367ea79a3f24
--- /dev/null
+++ b/graph/incidents_graphml/3/3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.248
+ USER-0015-1221.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704115101
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435
+
+
+
diff --git a/graph/incidents_graphml/3/3c17ec00-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3c17ec00-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..481b7eae5b14e853b400ca8b8f0676a46db929b3
--- /dev/null
+++ b/graph/incidents_graphml/3/3c17ec00-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.20
+ 100.64.57.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597086
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c17ec00-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3c1c2da0-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/3c1c2da0-27a9-11ee-82e1-59dd32b62381.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f88e0e841b36fe14b0d702e010f2fcf383b0ad75
--- /dev/null
+++ b/graph/incidents_graphml/3/3c1c2da0-27a9-11ee-82e1-59dd32b62381.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.177
+ 100.64.56.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689931830
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3c1c2da0-27a9-11ee-82e1-59dd32b62381
+
+
+
diff --git a/graph/incidents_graphml/3/3c1c9a40-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3c1c9a40-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bbc42a9377c2acb7989ff212200562a66737aa1
--- /dev/null
+++ b/graph/incidents_graphml/3/3c1c9a40-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.10.89
+ 100.64.10.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821678
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c1c9a40-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3c25db10-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3c25db10-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a318d8d3fe7b4195673990680f9513595e984e8f
--- /dev/null
+++ b/graph/incidents_graphml/3/3c25db10-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.89
+ 100.64.7.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061836
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c25db10-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3c2a6420-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3c2a6420-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c6a694bcf9ba008db15dec3871808993a6b6fd5
--- /dev/null
+++ b/graph/incidents_graphml/3/3c2a6420-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.43
+ 100.64.10.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961535
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c2a6420-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/3c2cfaa0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3c2cfaa0-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a54cc73ec47d19a04b8c96dcf18382e55d4202bd
--- /dev/null
+++ b/graph/incidents_graphml/3/3c2cfaa0-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.20
+ 100.64.57.20
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597086
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c2cfaa0-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3c3336c0-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/3/3c3336c0-2435-11ee-bc29-cfb067a56058.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..04b75cb7e44070d04937956a7b6758edbdc730f2
--- /dev/null
+++ b/graph/incidents_graphml/3/3c3336c0-2435-11ee-bc29-cfb067a56058.graphml
@@ -0,0 +1,169 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.92
+ 100.64.69.92
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.325
+ ["Precinct"]
+
+
+ HOST
+ 100.64.11.123
+ 100.64.11.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+ INCIDENT_LINK
+ 1689552155
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 3c3336c0-2435-11ee-bc29-cfb067a56058
+
+
+
diff --git a/graph/incidents_graphml/3/3c3a42a0-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3c3a42a0-5e80-11ee-b169-95f488d76cb0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9b1d47fb5dd2493113b436e3be0a5ff51734569b
--- /dev/null
+++ b/graph/incidents_graphml/3/3c3a42a0-5e80-11ee-b169-95f488d76cb0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.43
+ 100.64.10.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695961535
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c3a42a0-5e80-11ee-b169-95f488d76cb0
+
+
+
diff --git a/graph/incidents_graphml/3/3c48f570-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c48f570-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f529ba16fa800c96557df2b86c20b8f42059fdbc
--- /dev/null
+++ b/graph/incidents_graphml/3/3c48f570-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.138
+ 100.64.12.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c48f570-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3c4bf400-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3c4bf400-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..955e997661c65ff71b4c0a62c578dabb13149927
--- /dev/null
+++ b/graph/incidents_graphml/3/3c4bf400-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.93
+ 100.64.13.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802621
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c4bf400-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3c531530-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3c531530-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f26247be798639542fdddc297f8ab05c5ae087d
--- /dev/null
+++ b/graph/incidents_graphml/3/3c531530-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.122
+ 100.64.49.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927931
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c531530-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3c5400f0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/3/3c5400f0-41f3-11ed-a891-2d9e83e3a063.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5922d5cc8d0645b3b0875a1a75966fe3c824ef18
--- /dev/null
+++ b/graph/incidents_graphml/3/3c5400f0-41f3-11ed-a891-2d9e83e3a063.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.190.96.179
+ 100.64.94.50
+ []
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.94.51
+ 100.64.94.51
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1664674846
+ malicious
+ 0.7
+ 0.578125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c5400f0-41f3-11ed-a891-2d9e83e3a063
+
+
+
diff --git a/graph/incidents_graphml/3/3c592210-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c592210-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..143554dc9c7c1f3ac65476e1316a2c85342a56ef
--- /dev/null
+++ b/graph/incidents_graphml/3/3c592210-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.138
+ 100.64.12.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810484
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c592210-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3c5b0f30-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3c5b0f30-5d0e-11ee-9c46-6338cea7f59f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9d1e33ceeb9d4abdbf6ac1ca65d4e8186f3ec9f
--- /dev/null
+++ b/graph/incidents_graphml/3/3c5b0f30-5d0e-11ee-9c46-6338cea7f59f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.93
+ 100.64.13.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695802621
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c5b0f30-5d0e-11ee-9c46-6338cea7f59f
+
+
+
diff --git a/graph/incidents_graphml/3/3c664170-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c664170-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9973206d40e128494ec9454f32ed61277a56ef6b
--- /dev/null
+++ b/graph/incidents_graphml/3/3c664170-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.140
+ 100.64.12.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c664170-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3c67ec60-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3c67ec60-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a4da123a9b91e8d58c79a36adfbde89530eef748
--- /dev/null
+++ b/graph/incidents_graphml/3/3c67ec60-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.19
+ 100.64.92.19
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1666302209
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c67ec60-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/3/3c6ba640-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3c6ba640-0c57-11ee-a19d-25527a25a69c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed2c5f46d5b5a386a6faa5145655b751da1c9f77
--- /dev/null
+++ b/graph/incidents_graphml/3/3c6ba640-0c57-11ee-a19d-25527a25a69c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.122
+ 100.64.49.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686927931
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3c6ba640-0c57-11ee-a19d-25527a25a69c
+
+
+
diff --git a/graph/incidents_graphml/3/3c6d1c80-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3c6d1c80-50c0-11ed-875b-db834c6ab2cd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edc68e5705cd7cab4b676f624d918381f0009834
--- /dev/null
+++ b/graph/incidents_graphml/3/3c6d1c80-50c0-11ed-875b-db834c6ab2cd.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.92.19
+ 100.64.92.19
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1666302209
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c6d1c80-50c0-11ed-875b-db834c6ab2cd
+
+
+
diff --git a/graph/incidents_graphml/3/3c750e80-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c750e80-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e56f10490e38c748d15662930908ca5fdf5af4ec
--- /dev/null
+++ b/graph/incidents_graphml/3/3c750e80-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.140
+ 100.64.12.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810484
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c750e80-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3c768e70-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c768e70-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1a3ce4503a77d004491f2e13c8e976f4c953b56
--- /dev/null
+++ b/graph/incidents_graphml/3/3c768e70-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.190
+ 100.64.92.190
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c768e70-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c7a10e0-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c7a10e0-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a64eb2d361565d4db1fbfa76159952408d35d03
--- /dev/null
+++ b/graph/incidents_graphml/3/3c7a10e0-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.225
+ 100.64.5.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c7a10e0-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c7f6810-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c7f6810-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..978a038bc8454d1ab78e793dcca49c411bf19c15
--- /dev/null
+++ b/graph/incidents_graphml/3/3c7f6810-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.5.225
+ 100.64.5.225
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c7f6810-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c82c370-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c82c370-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2182b9ab55a26febd7417e1b57dace9623274b44
--- /dev/null
+++ b/graph/incidents_graphml/3/3c82c370-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.192
+ 100.64.92.192
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c82c370-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c881aa0-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c881aa0-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f83aa7e66529115992e140450c66b55845790705
--- /dev/null
+++ b/graph/incidents_graphml/3/3c881aa0-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.192
+ 100.64.92.192
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c881aa0-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c8cae80-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c8cae80-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bac2878a015821b61d18bf413514fcc30fd65b81
--- /dev/null
+++ b/graph/incidents_graphml/3/3c8cae80-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.92.194
+ 100.64.92.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3c8cae80-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c908c70-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3c908c70-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e27f120b08d0769633d697fdfe9abe1ed996ea02
--- /dev/null
+++ b/graph/incidents_graphml/3/3c908c70-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3c908c70-2b9d-11ee-a75c-6705ed43e196
+
+
+ INCIDENT_LINK
+ 1690366482
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3c908c70-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3c931cf0-2481-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/3/3c931cf0-2481-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64a8b6542631952d10c7e9844aea2d20da5763c4
--- /dev/null
+++ b/graph/incidents_graphml/3/3c931cf0-2481-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.243
+ 100.64.23.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717732295
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3c931cf0-2481-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/3/3c933e30-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c933e30-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a3a5ce38da633d2e31221c3d61762ed3b0acd825
--- /dev/null
+++ b/graph/incidents_graphml/3/3c933e30-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.92.194
+ 100.64.92.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c933e30-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3c9d0230-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c9d0230-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e77f39627b934be81f60fb4b499bd7c10c7f0817
--- /dev/null
+++ b/graph/incidents_graphml/3/3c9d0230-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.231
+ 100.64.84.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.200
+ 100.64.92.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662210394
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3c9d0230-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3ca71a20-2481-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/3/3ca71a20-2481-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..785d7dab2a11daabde2fe55bad2b5fcd39732ed2
--- /dev/null
+++ b/graph/incidents_graphml/3/3ca71a20-2481-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.245
+ 100.64.23.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717732295
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3ca71a20-2481-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/3/3ca8cf60-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3ca8cf60-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56b4fccb85f60daa63e0bf68cc965404bda391a8
--- /dev/null
+++ b/graph/incidents_graphml/3/3ca8cf60-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3ca8cf60-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3cae0b00-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cae0b00-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..498e300e09c020e8a7b222dc17fae1273fe89156
--- /dev/null
+++ b/graph/incidents_graphml/3/3cae0b00-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.14
+ 100.64.41.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685077659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cae0b00-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..513152e5a40e791ebe741db9628896e13aa6dcb4
--- /dev/null
+++ b/graph/incidents_graphml/3/3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.91
+ 100.64.7.91
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061837
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3cb3db40-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3cb3db40-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0881103dfab06d3d6daf291b87f1e88773809820
--- /dev/null
+++ b/graph/incidents_graphml/3/3cb3db40-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.152
+ 100.64.78.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1706165090
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3cb3db40-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/3cb48880-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3cb48880-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b521e1bd5f133c9b7e6c240d279eae3b2f94bd50
--- /dev/null
+++ b/graph/incidents_graphml/3/3cb48880-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.142
+ 100.64.12.142
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810485
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cb48880-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3cb87d70-af33-11ed-996b-a522ebb85241.graphml b/graph/incidents_graphml/3/3cb87d70-af33-11ed-996b-a522ebb85241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..599308addfab73fc3881ec1add99fc2841ffb86a
--- /dev/null
+++ b/graph/incidents_graphml/3/3cb87d70-af33-11ed-996b-a522ebb85241.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.23
+ 100.64.85.23
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.24
+ 100.64.85.24
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.25
+ 100.64.85.25
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.223
+ 100.64.34.223
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.26
+ 100.64.85.26
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.188
+ 100.64.18.188
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.27
+ 100.64.85.27
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.28
+ 100.64.85.28
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.150
+ 100.64.8.150
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.29
+ 100.64.85.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.85.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.16.10
+ 100.64.16.10
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.31
+ 100.64.85.31
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.32
+ 100.64.85.32
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.33
+ 100.64.85.33
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.34
+ 100.64.85.34
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.126
+ 100.64.26.126
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.85.35
+ 100.64.85.35
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+ INCIDENT_LINK
+ 1676687011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cb87d70-af33-11ed-996b-a522ebb85241
+
+
+
diff --git a/graph/incidents_graphml/3/3cbc9df0-2481-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/3/3cbc9df0-2481-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8873ab703dc833ae20afe85bad1408df3471ddf
--- /dev/null
+++ b/graph/incidents_graphml/3/3cbc9df0-2481-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.245
+ 100.64.23.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717732296
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cbc9df0-2481-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/3/3cc004b0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3cc004b0-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..92a682e9a292243cdd95a8a1f55bc21869c10e20
--- /dev/null
+++ b/graph/incidents_graphml/3/3cc004b0-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.8.114
+ 100.64.8.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659730051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cc004b0-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3cc16070-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3cc16070-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..287e66ef3bd74b2bae8f8ef7a186cf657416d483
--- /dev/null
+++ b/graph/incidents_graphml/3/3cc16070-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366482
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3cc16070-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3cc196e0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3cc196e0-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a69b0df7e8dffad1b64a0585ee5e8bb5a567a5c
--- /dev/null
+++ b/graph/incidents_graphml/3/3cc196e0-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.78.152
+ 100.64.78.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706165090
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cc196e0-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/3cc42b10-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cc42b10-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28e0d146cc5b11a50d6241139fd474750d2ef0d3
--- /dev/null
+++ b/graph/incidents_graphml/3/3cc42b10-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.14
+ 100.64.41.14
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685077659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cc42b10-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3cc614b0-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3cc614b0-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b5bb885b3c957bd5e94e35bf631529c43541c8f
--- /dev/null
+++ b/graph/incidents_graphml/3/3cc614b0-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.2
+ 100.64.8.2
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810485
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3cc614b0-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e73d071591ce38da7b12006a5e514278fdf4b7d9
--- /dev/null
+++ b/graph/incidents_graphml/3/3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.91
+ 100.64.7.91
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061837
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3ccaa950-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3ccaa950-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b757df4ac7f92eccf5fb7d498cca37e061fadc81
--- /dev/null
+++ b/graph/incidents_graphml/3/3ccaa950-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.188
+ 100.64.20.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685210374
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ccaa950-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/3ccad7a0-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3ccad7a0-784f-11ee-8281-459da66dfacb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c186991fc0d2df4f658551408e9611b1f1a91471
--- /dev/null
+++ b/graph/incidents_graphml/3/3ccad7a0-784f-11ee-8281-459da66dfacb.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.11
+ USER-0015-1482.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698799221
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3ccad7a0-784f-11ee-8281-459da66dfacb
+
+
+
diff --git a/graph/incidents_graphml/3/3ccd7dc0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3ccd7dc0-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c850ad2043bc278ea9e1e0ecdfc060c03cab882
--- /dev/null
+++ b/graph/incidents_graphml/3/3ccd7dc0-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.94.127
+ 100.64.94.127
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1706165090
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3ccd7dc0-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/3cd190e0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3cd190e0-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cfbef91ae1d035129521b4afe0f0f6242e41f49
--- /dev/null
+++ b/graph/incidents_graphml/3/3cd190e0-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.95.233
+ 100.64.95.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1659730051
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3cd190e0-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3cd5d2d0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3cd5d2d0-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee754ef5c3e74b9ce82ddcb5c07f00e3833378b8
--- /dev/null
+++ b/graph/incidents_graphml/3/3cd5d2d0-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.51
+ 100.64.7.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366482
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cd5d2d0-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3cda00e0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3cda00e0-bb4d-11ee-a6c4-95259d299227.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..455b6c61e8e48b5f6d7fa579c7e48542a8953876
--- /dev/null
+++ b/graph/incidents_graphml/3/3cda00e0-bb4d-11ee-a6c4-95259d299227.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.6.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.94.127
+ 100.64.94.127
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1706165090
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cda00e0-bb4d-11ee-a6c4-95259d299227
+
+
+
diff --git a/graph/incidents_graphml/3/3cda9190-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3cda9190-14fa-11ed-995a-47ed1ad8ede7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a22333d8cc0a8329d3fb09788b6c378a8905d8b7
--- /dev/null
+++ b/graph/incidents_graphml/3/3cda9190-14fa-11ed-995a-47ed1ad8ede7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.95.233
+ 100.64.95.233
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1659730051
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cda9190-14fa-11ed-995a-47ed1ad8ede7
+
+
+
diff --git a/graph/incidents_graphml/3/3cdbaab0-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cdbaab0-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..198cb4f1f9bddd37405336444541b90c2e15b6eb
--- /dev/null
+++ b/graph/incidents_graphml/3/3cdbaab0-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.16
+ 100.64.41.16
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1685077659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cdbaab0-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3cdc40d0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3cdc40d0-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fbfba412d6b28e4eb7c13b90156d7e123066882
--- /dev/null
+++ b/graph/incidents_graphml/3/3cdc40d0-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.234
+ 100.64.22.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3cdc40d0-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/3/3cdc7c30-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3cdc7c30-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0739fd02e13736e26ee11c47e9226aef60ac7297
--- /dev/null
+++ b/graph/incidents_graphml/3/3cdc7c30-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.231
+ 100.64.84.231
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Barracuda WAF","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.202
+ 100.64.92.202
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1662210395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cdc7c30-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3cdec620-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3cdec620-2b89-11ed-80c0-adfe06f1feac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..19f8aefa4c758bb1dd5bc9d771511e78cb7686d7
--- /dev/null
+++ b/graph/incidents_graphml/3/3cdec620-2b89-11ed-80c0-adfe06f1feac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662210395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3cdec620-2b89-11ed-80c0-adfe06f1feac
+
+
+
diff --git a/graph/incidents_graphml/3/3cec8670-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3cec8670-31f0-11ee-bb84-0df6679a1a3d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d0d04db6ce69c97b5a4ba6a3ee4eb4343ed97337
--- /dev/null
+++ b/graph/incidents_graphml/3/3cec8670-31f0-11ee-bb84-0df6679a1a3d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.93
+ 100.64.7.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691061838
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3cec8670-31f0-11ee-bb84-0df6679a1a3d
+
+
+
diff --git a/graph/incidents_graphml/3/3cedfb80-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/3/3cedfb80-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e9a976e97c89fed8399af24804231a0486443e3
--- /dev/null
+++ b/graph/incidents_graphml/3/3cedfb80-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.233
+ USER-0015-1231.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cedfb80-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159250
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cedfb80-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/3/3cf14420-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3cf14420-fcb8-11ed-bdca-e96ab691d6d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4afd86977a3c002f94cbec82174a3c9aa37b9b1b
--- /dev/null
+++ b/graph/incidents_graphml/3/3cf14420-fcb8-11ed-bdca-e96ab691d6d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.20.188
+ 100.64.20.188
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685210374
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cf14420-fcb8-11ed-bdca-e96ab691d6d5
+
+
+
diff --git a/graph/incidents_graphml/3/3cf80c50-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cf80c50-fb83-11ed-b62e-59f6599c4691.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2be6083b29c58fdf5b4bd3660e038b9652de60e9
--- /dev/null
+++ b/graph/incidents_graphml/3/3cf80c50-fb83-11ed-b62e-59f6599c4691.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.41.16
+ 100.64.41.16
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685077660
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cf80c50-fb83-11ed-b62e-59f6599c4691
+
+
+
diff --git a/graph/incidents_graphml/3/3cfd0f40-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3cfd0f40-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4447492ff943aec187c4a73803434c1a8b978093
--- /dev/null
+++ b/graph/incidents_graphml/3/3cfd0f40-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.234
+ 100.64.22.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300901
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3cfd0f40-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/3/3d0bf750-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3d0bf750-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5f1a7d7c10873029ea82b41074ba17e99cb5404
--- /dev/null
+++ b/graph/incidents_graphml/3/3d0bf750-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810485
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d0bf750-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3d0f8f70-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/3d0f8f70-6590-11ee-b6b8-b9a4d865fde2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..53b687d900b619cb1cae836d8c2e8ecd4238a616
--- /dev/null
+++ b/graph/incidents_graphml/3/3d0f8f70-6590-11ee-b6b8-b9a4d865fde2.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.64
+ 100.64.32.64
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.206
+ 100.64.6.206
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.65
+ 100.64.32.65
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.66
+ 100.64.32.66
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.67
+ 100.64.32.67
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.6
+ 100.64.16.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.68
+ 100.64.32.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.69
+ 100.64.32.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.70
+ 100.64.32.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.71
+ 100.64.32.71
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.235
+ 100.64.19.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.72
+ 100.64.32.72
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.73
+ USER-0015-1292.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.74
+ 100.64.32.74
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.75
+ 100.64.32.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.69
+ 100.64.28.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.196
+ 100.64.24.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.76
+ 100.64.32.76
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.77
+ 100.64.32.77
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+ INCIDENT_LINK
+ 1696738066
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2
+
+
+
diff --git a/graph/incidents_graphml/3/3d1b1e90-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3d1b1e90-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fae9d62fdd16adf3e4294f39d24b4d680f80b980
--- /dev/null
+++ b/graph/incidents_graphml/3/3d1b1e90-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.236
+ 100.64.22.236
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300901
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d1b1e90-21ec-11ee-86db-6b99d218dc75
+
+
+
diff --git a/graph/incidents_graphml/3/3d1cc6e0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d1cc6e0-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8482ec1358f3b0bcedde61890349bc700469ca4a
--- /dev/null
+++ b/graph/incidents_graphml/3/3d1cc6e0-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.117
+ 100.64.13.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3d1cc6e0-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3d1daa90-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3d1daa90-5408-11ee-b5a3-f722d9347af6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4402689101af23fe55a1f129fe706e5b69ca9668
--- /dev/null
+++ b/graph/incidents_graphml/3/3d1daa90-5408-11ee-b5a3-f722d9347af6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694810485
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3d1daa90-5408-11ee-b5a3-f722d9347af6
+
+
+
diff --git a/graph/incidents_graphml/3/3d290130-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3d290130-f92f-11ed-ab43-ff746e796bda.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d9280fe23bd9c04f2e4cfc81a8eadce865f25629
--- /dev/null
+++ b/graph/incidents_graphml/3/3d290130-f92f-11ed-ab43-ff746e796bda.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.91
+ 100.64.10.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1684821680
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d290130-f92f-11ed-ab43-ff746e796bda
+
+
+
diff --git a/graph/incidents_graphml/3/3d34a6a0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3d34a6a0-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdc3a83627417695ff64c6cdd2b82f71b111e47c
--- /dev/null
+++ b/graph/incidents_graphml/3/3d34a6a0-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.22
+ 100.64.57.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597088
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d34a6a0-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3d4305d0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/3/3d4305d0-249e-11ef-8629-fb371c38e19d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..88a3df0808023dc2201acf045cbe728e948cfd24
--- /dev/null
+++ b/graph/incidents_graphml/3/3d4305d0-249e-11ef-8629-fb371c38e19d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.120
+ 100.64.56.120
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717744752
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3d4305d0-249e-11ef-8629-fb371c38e19d
+
+
+
diff --git a/graph/incidents_graphml/3/3d4a2030-3fc5-11ef-8c1a-53987decb6d6.graphml b/graph/incidents_graphml/3/3d4a2030-3fc5-11ef-8c1a-53987decb6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3280ea1218297d2efd677dce7aadc7fcd75f1c4e
--- /dev/null
+++ b/graph/incidents_graphml/3/3d4a2030-3fc5-11ef-8c1a-53987decb6d6.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.213
+ 100.64.42.213
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.9.30.149
+ 10.9.30.149
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720730184
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d4a2030-3fc5-11ef-8c1a-53987decb6d6
+
+
+ INCIDENT_LINK
+ 1720730184
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d4a2030-3fc5-11ef-8c1a-53987decb6d6
+
+
+
diff --git a/graph/incidents_graphml/3/3d5f8730-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3d5f8730-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0577f03da724201a0c09f3a0ab143a2d8f9f581a
--- /dev/null
+++ b/graph/incidents_graphml/3/3d5f8730-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.22
+ 100.64.57.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597088
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3d5f8730-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3d613b80-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3d613b80-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7a46585318cc8ff27aa3bd557de6ff9583057bf
--- /dev/null
+++ b/graph/incidents_graphml/3/3d613b80-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,151 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.26
+ 100.64.81.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.88
+ 100.64.72.88
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.36.139
+ 100.64.36.139
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.104
+ 100.64.72.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/3d62e930-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3d62e930-fdf5-11ec-a66d-037b7a1a7f6a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e8e9eefdec282673a4817bd095ce21d3d825bde7
--- /dev/null
+++ b/graph/incidents_graphml/3/3d62e930-fdf5-11ec-a66d-037b7a1a7f6a.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.25
+ 100.64.20.25
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.60
+ 100.64.73.60
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.111
+ 100.64.80.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+ INCIDENT_LINK
+ 1657199028
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a
+
+
+
diff --git a/graph/incidents_graphml/3/3d62ff60-3fc5-11ef-8c1a-53987decb6d6.graphml b/graph/incidents_graphml/3/3d62ff60-3fc5-11ef-8c1a-53987decb6d6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68f8663dd7b6492e09e7e05effcc2e687af42e2d
--- /dev/null
+++ b/graph/incidents_graphml/3/3d62ff60-3fc5-11ef-8c1a-53987decb6d6.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.214
+ 100.64.42.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720730184
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d62ff60-3fc5-11ef-8c1a-53987decb6d6
+
+
+
diff --git a/graph/incidents_graphml/3/3d65ddd0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d65ddd0-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b5ecb2a99b933887df68e0734e21217ce152ea5
--- /dev/null
+++ b/graph/incidents_graphml/3/3d65ddd0-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.119
+ 100.64.13.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d65ddd0-2b9d-11ee-a75c-6705ed43e196
+
+
+ INCIDENT_LINK
+ 1690366483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d65ddd0-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3d7730d0-0e2e-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/3/3d7730d0-0e2e-11ee-bc7f-2529405b1969.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..120024a7305ab6427f7525296832122903f56408
--- /dev/null
+++ b/graph/incidents_graphml/3/3d7730d0-0e2e-11ee-bc7f-2529405b1969.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.211
+ 100.64.8.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.218
+ 100.64.71.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687130225
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d7730d0-0e2e-11ee-bc7f-2529405b1969
+
+
+ INCIDENT_LINK
+ 1687130225
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d7730d0-0e2e-11ee-bc7f-2529405b1969
+
+
+
diff --git a/graph/incidents_graphml/3/3d7a7740-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d7a7740-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1de60fc0236e7860ff9c2a1ee6469fec044e1f2
--- /dev/null
+++ b/graph/incidents_graphml/3/3d7a7740-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.119
+ 100.64.13.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3d7a7740-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3d873dc0-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/3/3d873dc0-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f0763a83fdbba55c44fd7c285329c71c7662196
--- /dev/null
+++ b/graph/incidents_graphml/3/3d873dc0-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.50.224
+ 100.64.50.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671662
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3d873dc0-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/3/3d87e5c0-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3d87e5c0-0482-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a8695eac08cfa78fab58a5efe85f1146e3f7af67
--- /dev/null
+++ b/graph/incidents_graphml/3/3d87e5c0-0482-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.19.5
+ 100.64.19.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686066792
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3d87e5c0-0482-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3d899f40-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/3/3d899f40-43ac-11ef-a622-2be670a61274.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8abe877b8b92ed7c38a9b039f9a88c3c871d85d
--- /dev/null
+++ b/graph/incidents_graphml/3/3d899f40-43ac-11ef-a622-2be670a61274.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.62
+ USER-0015-1313.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.239
+ 100.64.37.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1721159251
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d899f40-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159251
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d899f40-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159251
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d899f40-43ac-11ef-a622-2be670a61274
+
+
+ INCIDENT_LINK
+ 1721159251
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d899f40-43ac-11ef-a622-2be670a61274
+
+
+
diff --git a/graph/incidents_graphml/3/3d8b61a0-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/3d8b61a0-294d-11ef-a020-fd333ff9534c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66393e7fb8e7aafe9255c60fd0d569f653414332
--- /dev/null
+++ b/graph/incidents_graphml/3/3d8b61a0-294d-11ef-a020-fd333ff9534c.graphml
@@ -0,0 +1,769 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.205
+ 100.64.65.205
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.70
+ 100.64.60.70
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.66
+ 100.64.24.66
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target"]
+ 0.68359375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.143
+ 100.64.37.143
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.60.69
+ 100.64.60.69
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.210
+ 100.64.44.210
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.206
+ 100.64.65.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.207
+ 100.64.65.207
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.208
+ 100.64.65.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.209
+ 100.64.65.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.210
+ 100.64.65.210
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.74
+ 100.64.8.74
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.211
+ 100.64.65.211
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.212
+ 100.64.65.212
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.213
+ 100.64.65.213
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.214
+ 100.64.65.214
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.215
+ 100.64.65.215
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d8b61a0-294d-11ef-a020-fd333ff9534c
+
+
+
diff --git a/graph/incidents_graphml/3/3d91f6e0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d91f6e0-2b9d-11ee-a75c-6705ed43e196.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51cead2b368bd97b31c93181cae66ee682dc7670
--- /dev/null
+++ b/graph/incidents_graphml/3/3d91f6e0-2b9d-11ee-a75c-6705ed43e196.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.153
+ 100.64.6.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690366483
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 3d91f6e0-2b9d-11ee-a75c-6705ed43e196
+
+
+
diff --git a/graph/incidents_graphml/3/3d94a0f0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3d94a0f0-126d-11ee-9cb5-514a509424ae.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df225a75833a81ad489e31a0f25507fd28d4b3ef
--- /dev/null
+++ b/graph/incidents_graphml/3/3d94a0f0-126d-11ee-9cb5-514a509424ae.graphml
@@ -0,0 +1,683 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.57.24
+ 100.64.57.24
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.250
+ 100.64.17.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.103
+ 100.64.28.103
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.19
+ 100.64.11.19
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.45
+ 100.64.39.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.25
+ 100.64.57.25
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.136
+ 100.64.4.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.26
+ 100.64.57.26
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.97
+ 100.64.25.97
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.27
+ 100.64.57.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.7525
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.28
+ 100.64.57.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.121
+ 100.64.43.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.29
+ 100.64.57.29
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.187
+ 100.64.33.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.30
+ 100.64.57.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.211
+ 100.64.45.211
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.114
+ 100.64.22.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+ INCIDENT_LINK
+ 1687597089
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d94a0f0-126d-11ee-9cb5-514a509424ae
+
+
+
diff --git a/graph/incidents_graphml/3/3d96ce20-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/3/3d96ce20-7726-11ee-af8e-272b0e07eabf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd6f9c7d7b91bdff9f43f403cb2266a873d83e21
--- /dev/null
+++ b/graph/incidents_graphml/3/3d96ce20-7726-11ee-af8e-272b0e07eabf.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.50.224
+ 100.64.50.224
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698671662
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 3d96ce20-7726-11ee-af8e-272b0e07eabf
+
+
+
diff --git a/graph/incidents_graphml/3/3d988100-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/3d988100-294d-11ef-a020-fd333ff9534c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ebc7f564d0a3521e5a0ae2c8df375c69b298973
--- /dev/null
+++ b/graph/incidents_graphml/3/3d988100-294d-11ef-a020-fd333ff9534c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.227
+ 100.64.65.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.30
+ 100.64.49.30
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.195
+ 100.64.31.195
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d988100-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d988100-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d988100-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d988100-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d988100-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d988100-294d-11ef-a020-fd333ff9534c
+
+
+
diff --git a/graph/incidents_graphml/3/3d9a3540-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3d9a3540-0482-11ee-9300-094b5588de47.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9270f5f04d25f68d867bfc79031bffefd0b2a33
--- /dev/null
+++ b/graph/incidents_graphml/3/3d9a3540-0482-11ee-9300-094b5588de47.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.195
+ 100.64.22.195
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686066792
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3d9a3540-0482-11ee-9300-094b5588de47
+
+
+
diff --git a/graph/incidents_graphml/3/3da7c340-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/3da7c340-294d-11ef-a020-fd333ff9534c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cb9462165cc99ceda4ca93c9b448e1b6a22e6f9
--- /dev/null
+++ b/graph/incidents_graphml/3/3da7c340-294d-11ef-a020-fd333ff9534c.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.245
+ 100.64.37.245
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.138
+ 100.64.40.138
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.231
+ 100.64.65.231
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3da7c340-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3da7c340-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3da7c340-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3da7c340-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3da7c340-294d-11ef-a020-fd333ff9534c
+
+
+ INCIDENT_LINK
+ 1718259719
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 3da7c340-294d-11ef-a020-fd333ff9534c
+
+
+
diff --git a/graph/incidents_graphml/3/3da84360-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3da84360-21ec-11ee-86db-6b99d218dc75.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc97ad0a83b8e54561f91049493512cc6b976c6f
--- /dev/null
+++ b/graph/incidents_graphml/3/3da84360-21ec-11ee-86db-6b99d218dc75.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.207
+ USER-0015-1237.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689300902
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 3da84360-21ec-11ee-86db-6b99d218dc75
+
+
+