diff --git a/graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..55c4403522cbabde19736fb9e168fd251067dd09 --- /dev/null +++ b/graph/incidents_graphml/3/334e14f0-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.86.113 + 100.64.86.113 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660536630 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 334e14f0-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml b/graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae26c6fd7c19f1247f2d05c24ed29d67e0585bc3 --- /dev/null +++ b/graph/incidents_graphml/3/335077a0-5e20-11ee-a8d3-61b0fc50a12d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.235 + 100.64.53.235 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695920288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 335077a0-5e20-11ee-a8d3-61b0fc50a12d + + + diff --git a/graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17d1771a7eb05f019499b0e55fe8a35a30a77348 --- /dev/null +++ b/graph/incidents_graphml/3/33537410-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.158 + 100.64.81.158 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.126 + 100.64.71.126 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.159 + 100.64.81.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665146418 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33537410-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146418 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33537410-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146418 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33537410-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146418 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33537410-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c0995cfef2bfdc7fc9c3dd2152fbdb2070fab53 --- /dev/null +++ b/graph/incidents_graphml/3/33547d90-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.117 + 100.64.86.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660536630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 33547d90-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e888c36606a4aae31001d07bd14f215d50a71c42 --- /dev/null +++ b/graph/incidents_graphml/3/335f2160-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.227 + 100.64.28.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748455 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 335f2160-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..872e998f75c96906ce494ce5c7ceacfb982a7766 --- /dev/null +++ b/graph/incidents_graphml/3/336100b0-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.117 + 100.64.86.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660536630 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 336100b0-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2be651e1480362ef16cead09198b0432092518ce --- /dev/null +++ b/graph/incidents_graphml/3/3365e2b0-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1660536630 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3365e2b0-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml b/graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a0eb7161d9b1493156f88eee2ef825e61c4f0958 --- /dev/null +++ b/graph/incidents_graphml/3/3366b7b0-7a0c-11ee-9002-0de92ece484d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.193 + 100.64.12.193 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698990331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3366b7b0-7a0c-11ee-9002-0de92ece484d + + + diff --git a/graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml b/graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8b476931614bd20654932baad7bb3ad8b9ba74b3 --- /dev/null +++ b/graph/incidents_graphml/3/3370b820-1c50-11ed-bd09-797a43d85ced.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.7.252 + 100.64.7.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1660536630 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3370b820-1c50-11ed-bd09-797a43d85ced + + + diff --git a/graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c0d28c8037d108a274db5ff6fb618711844c077 --- /dev/null +++ b/graph/incidents_graphml/3/3372f780-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.227 + 100.64.28.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748455 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3372f780-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92f9b60b392b44b3f8f4cba9c3b925e90f4614ed --- /dev/null +++ b/graph/incidents_graphml/3/3374f730-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.213 + 100.64.2.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.216 + 100.64.71.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660685665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3374f730-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3374f730-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ef06a566dc3068b848496c3a1fbec81d0cfd61f --- /dev/null +++ b/graph/incidents_graphml/3/337529d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.46 + 100.64.80.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.147 + 100.64.72.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324369 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 337529d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 337529d0-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2d8c7388e9f495fb3d246cb81c9b7c6943b5ce8 --- /dev/null +++ b/graph/incidents_graphml/3/3376fe90-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.47 + 100.64.80.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.47.45 + 100.64.47.45 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki"] + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.9905078125 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.48 + 100.64.80.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.173 + 100.64.72.173 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.49 + 100.64.80.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.9.254 + 100.64.9.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.78.157 + 100.64.78.157 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324369 + malicious + 0.9905078125 + 0.9905078125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3376fe90-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c3d1493434e01ea45e6257d3fb7bd205237336d --- /dev/null +++ b/graph/incidents_graphml/3/33839d30-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.226 + 100.64.1.226 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.209 + 100.64.72.209 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.112 + 100.64.76.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.113 + 100.64.76.113 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.73 + 100.64.72.73 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.114 + 100.64.76.114 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.115 + 100.64.76.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.56 + HOST-13203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.45 + 100.64.73.45 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.116 + 100.64.76.116 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.117 + 100.64.76.117 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33839d30-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c14904775cb0ca295408d74c6490b3c94d9da86 --- /dev/null +++ b/graph/incidents_graphml/3/33863540-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.118 + 100.64.76.118 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.13 + 100.64.74.13 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.119 + 100.64.76.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660685665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33863540-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33863540-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33863540-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685665 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33863540-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea433439a1b269ef6e7248eee623740b5ed11fc6 --- /dev/null +++ b/graph/incidents_graphml/3/338e2790-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.83.74 + 100.64.83.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661661053 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 338e2790-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e32ca41142b8f63e2a093150131139143786e858 --- /dev/null +++ b/graph/incidents_graphml/3/338edeb0-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288672 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 338edeb0-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22f466156b197379b45cfe08dec9ec6c8498c5d2 --- /dev/null +++ b/graph/incidents_graphml/3/3390a1e0-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.152 + 100.64.76.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.181 + 100.64.71.181 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.19.14 + 100.64.19.14 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.76.153 + 100.64.76.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.154 + 100.64.76.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893688 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3390a1e0-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ceb0124681f3348e6bfad4c727e3b51a4ab45211 --- /dev/null +++ b/graph/incidents_graphml/3/339528f0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.7 + 100.64.53.7 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 339528f0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbd72d01e447398ec39e6bff98c5c46ead798b2b --- /dev/null +++ b/graph/incidents_graphml/3/33a6d380-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.70 + 100.64.13.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288673 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 33a6d380-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..132fe192e8b5c21f035d80832db57b9e03e0cc7f --- /dev/null +++ b/graph/incidents_graphml/3/33c53e60-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.183 + 100.64.20.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685210359 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33c53e60-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3bc393aa8a141c615c202803c63fb128027068a --- /dev/null +++ b/graph/incidents_graphml/3/33cf81e0-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,767 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.213 + 100.64.75.213 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.75.181 + 100.64.75.181 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.55.189 + 100.64.55.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.160 + 100.64.81.160 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.1.28 + 100.64.1.28 + ["Exploiting Target","Exploiting Host"] + 0.980224609375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.7.250 + 100.64.7.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.161 + 100.64.81.161 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.162 + 100.64.81.162 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 192.168.147.151 + 192.168.147.151 + ["Exploiting Target","Exploiting Host"] + 0.947265625 + ["Precinct","Meraki","Umbrella","Windows Active Directory","Cisco Meraki Firewall"] + + + CRED + CRED-0009 + ["Suspicious User"] + 0.8125 + ["Umbrella"] + + + HOST + 100.64.81.163 + 100.64.81.163 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.105 + 100.64.71.105 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.81.164 + 100.64.81.164 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + HOST-16045 + ["Exploiting Host","Exploiting Target"] + 0.947265625 + ["Precinct","Umbrella","Meraki"] + + + CRED + CRED-0010 + ["Suspicious User"] + 0.8125 + ["Umbrella"] + + + HOST + 100.64.23.167 + 100.64.23.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.160 + 100.64.72.160 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.165 + 100.64.81.165 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.166 + 100.64.81.166 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.81.167 + 100.64.81.167 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.168 + 100.64.81.168 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.169 + 100.64.81.169 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146419 + malicious + 0.980224609375 + 0.980224609375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Suspicious User"] + complete-mission + Disrupted + 33cf81e0-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84df5ae261acaab77a2deff5bc1acd3512e4c25f --- /dev/null +++ b/graph/incidents_graphml/3/33e12990-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.83.75 + 100.64.83.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661661053 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 33e12990-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d53abe4f599c09c4895a4111515ddc50c2708ef2 --- /dev/null +++ b/graph/incidents_graphml/3/33e767a0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.7 + 100.64.53.7 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339707 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 33e767a0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fab4b20ac43f15109939dd68e631446f0260e5e0 --- /dev/null +++ b/graph/incidents_graphml/3/33e918d0-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.177 + 100.64.75.177 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.83.75 + 100.64.83.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661661053 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 33e918d0-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57cc7754a0b794c6bfa9d12037423f4677111720 --- /dev/null +++ b/graph/incidents_graphml/3/33ef0d80-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.20.183 + 100.64.20.183 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685210359 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 33ef0d80-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a80f82f13a0fee88a2070dfe8c3469c3d5309658 --- /dev/null +++ b/graph/incidents_graphml/3/340e67a0-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.131 + 100.64.50.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462508 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 340e67a0-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..acefb5d2cb7e102b7488e5a6dc27f636ac5e625b --- /dev/null +++ b/graph/incidents_graphml/3/34192ac0-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.90 + 100.64.4.90 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685210359 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 34192ac0-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53e938106271aab9c6b798d8b9b0cdba16d853a3 --- /dev/null +++ b/graph/incidents_graphml/3/341fdbe0-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.89 + 100.64.52.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 341fdbe0-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f12d6c9b20b1cb4e2875a8f15b2ebf089d8deace --- /dev/null +++ b/graph/incidents_graphml/3/34265c70-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.131 + 100.64.50.131 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462509 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34265c70-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92d8b052a426e3adebdf0d0827de8b1cc844501e --- /dev/null +++ b/graph/incidents_graphml/3/342e5ad0-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355938 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 342e5ad0-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml b/graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..350dfc27c2b7ac73774033d135cf5a133b6ef320 --- /dev/null +++ b/graph/incidents_graphml/3/3433af70-4147-11ee-a087-e963abb87ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.229 + 100.64.28.229 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692748457 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3433af70-4147-11ee-a087-e963abb87ef5 + + + diff --git a/graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml b/graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7521811c8fd3d58ef16d9714148913dff28d78f --- /dev/null +++ b/graph/incidents_graphml/3/343d7f30-1f34-11ee-bd83-b52c9cbf0232.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.13 + 100.64.29.13 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.249 + 100.64.73.249 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.36 + 100.64.77.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.13.181 + 100.64.13.181 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + INCIDENT_LINK + 1689001957 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 343d7f30-1f34-11ee-bd83-b52c9cbf0232 + + + diff --git a/graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92de22a2a7816d7af62356846f91ca6b00af9987 --- /dev/null +++ b/graph/incidents_graphml/3/343e6060-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.134 + 100.64.22.134 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355938 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 343e6060-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd3a4e887c950b074bcbc5d61bad6a6fba980e25 --- /dev/null +++ b/graph/incidents_graphml/3/344591f0-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.4.90 + 100.64.4.90 + ["Exploiting Target","Exploiting Host"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685210360 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 344591f0-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e7e79e186a4b31ff1e47665b7200dbd21ec0afb1 --- /dev/null +++ b/graph/incidents_graphml/3/34575ed0-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.73 + 100.64.26.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34575ed0-e0ce-11ee-bf77-99d8dd776972 + + + INCIDENT_LINK + 1710288674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34575ed0-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0b5027368cc5ed337d361421dc9ae952ecf7886 --- /dev/null +++ b/graph/incidents_graphml/3/346b34f0-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.73 + 100.64.26.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 346b34f0-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml b/graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cbd71e9468cdd4f6837ea0b56ee9d3de99fcc96 --- /dev/null +++ b/graph/incidents_graphml/3/34766920-3f00-11ef-a3c1-8be1e2d87500.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.44.235 + 100.64.44.235 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720645558 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34766920-3f00-11ef-a3c1-8be1e2d87500 + + + diff --git a/graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9fa3e8784e492e21b33c1af1dabef8ae7b49105 --- /dev/null +++ b/graph/incidents_graphml/3/347a7730-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288674 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 347a7730-e0ce-11ee-bf77-99d8dd776972 + + + INCIDENT_LINK + 1710288674 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 347a7730-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8abf46dcd6a3127fb34102f4ee9ad7f7866a879a --- /dev/null +++ b/graph/incidents_graphml/3/348a0f60-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.67 + 100.64.24.67 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355939 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 348a0f60-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6e752e903d252bcf9971fb5bb307382a0d2a472 --- /dev/null +++ b/graph/incidents_graphml/3/348d3be0-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 348d3be0-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e5caec58d531170ed331b77d98cbd2c5c746934 --- /dev/null +++ b/graph/incidents_graphml/3/3496dfa0-30ed-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.57 + 100.64.53.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.58 + 100.64.53.58 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.59 + 100.64.53.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.138 + 100.64.20.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.172 + 100.64.22.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098082 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3496dfa0-30ed-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a41483935436b29ad3efc9461031002fca29cab3 --- /dev/null +++ b/graph/incidents_graphml/3/34972ec0-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.89 + 100.64.52.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355939 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34972ec0-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7f916b5b760ad033aa45e6cb3ff7249253ab889 --- /dev/null +++ b/graph/incidents_graphml/3/34a18730-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.4 + 100.64.8.4 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288674 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34a18730-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab3c705715efff9e976dd2a2eea9c25cbc3c57c0 --- /dev/null +++ b/graph/incidents_graphml/3/34a42710-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.89 + 100.64.52.89 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355939 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34a42710-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml b/graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e32ba4b840bfb8e441fab96a609815c460f4a42c --- /dev/null +++ b/graph/incidents_graphml/3/34aed570-cf3a-11ee-a605-7bbb1d17de1b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.223 + 100.64.26.223 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708355939 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 34aed570-cf3a-11ee-a605-7bbb1d17de1b + + + diff --git a/graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3276abd93e83e168a2d98d1334d5eb71931ccde7 --- /dev/null +++ b/graph/incidents_graphml/3/34b25c30-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.9 + 100.64.69.9 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1703084296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34b25c30-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34b25c30-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3b725fd43d3f0c1bc60f50195db8a67c989b853 --- /dev/null +++ b/graph/incidents_graphml/3/34ce3c80-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.75 + 100.64.26.75 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288674 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34ce3c80-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5101a9cd14f50a139cb0f566a89def4025973030 --- /dev/null +++ b/graph/incidents_graphml/3/34ddbb60-097e-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.182 + 100.64.69.182 + ["Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.163 + 100.64.14.163 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686614815 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34ddbb60-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34ddbb60-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34ddbb60-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34ddbb60-097e-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml b/graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da9aa7ae0805a6c3ca0cbc2e9718dd61c01847cf --- /dev/null +++ b/graph/incidents_graphml/3/34e4aab0-e0ce-11ee-bf77-99d8dd776972.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.75 + 100.64.26.75 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710288675 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 34e4aab0-e0ce-11ee-bf77-99d8dd776972 + + + diff --git a/graph/incidents_graphml/3/34fbfb60-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/34fbfb60-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d203b1e7f045d05a985019b909c3b7d7b68811b --- /dev/null +++ b/graph/incidents_graphml/3/34fbfb60-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.185 + 100.64.52.185 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783545 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 34fbfb60-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/35051980-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/3/35051980-097e-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb6ea64a77a9c4eece8c7abdff6d82b22a8061b5 --- /dev/null +++ b/graph/incidents_graphml/3/35051980-097e-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,473 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.187 + 100.64.13.187 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.8 + 100.64.68.8 + ["Exploiting Host","Exploiting Target"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.25.129 + 100.64.25.129 + ["Exploiting Host","Exploiting Target"] + 0.325 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.16.236 + 100.64.16.236 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.8.21 + 100.64.8.21 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.9.100 + 100.64.9.100 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.24.248 + 100.64.24.248 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.61 + 100.64.12.61 + ["Exploiting Host","Exploiting Target"] + 0.325 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.325 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35051980-097e-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/3/350a7a50-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/350a7a50-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..088ec85adf99b1706d7543f02c6a6018f349f07a --- /dev/null +++ b/graph/incidents_graphml/3/350a7a50-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.185 + 100.64.52.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783545 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 350a7a50-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/351ca350-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/351ca350-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8cc4c53a02ae489484e2d8a473a41b7c000ef580 --- /dev/null +++ b/graph/incidents_graphml/3/351ca350-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.220 + 100.64.4.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657204 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 351ca350-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/351dd870-1329-11ef-aba1-33e212db0be8.graphml b/graph/incidents_graphml/3/351dd870-1329-11ef-aba1-33e212db0be8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cbf524a1f54c00d78bb57525712754998aabb2f --- /dev/null +++ b/graph/incidents_graphml/3/351dd870-1329-11ef-aba1-33e212db0be8.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.104 + 100.64.3.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.166 + 100.64.55.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.97 + 100.64.39.97 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.101 + 100.64.18.101 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + INCIDENT_LINK + 1715825317 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 351dd870-1329-11ef-aba1-33e212db0be8 + + + diff --git a/graph/incidents_graphml/3/35301530-6393-11ee-a10b-9345395d0398.graphml b/graph/incidents_graphml/3/35301530-6393-11ee-a10b-9345395d0398.graphml new file mode 100644 index 0000000000000000000000000000000000000000..115fc250987c4e8504741a37068083a2ba68f791 --- /dev/null +++ b/graph/incidents_graphml/3/35301530-6393-11ee-a10b-9345395d0398.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.188 + 100.64.36.188 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696519439 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35301530-6393-11ee-a10b-9345395d0398 + + + diff --git a/graph/incidents_graphml/3/3531a7c0-097e-11ee-8b37-9ba18759a170.graphml b/graph/incidents_graphml/3/3531a7c0-097e-11ee-8b37-9ba18759a170.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e2a0f95c84d1b0c7d59150e5ccaf0fdcc784186 --- /dev/null +++ b/graph/incidents_graphml/3/3531a7c0-097e-11ee-8b37-9ba18759a170.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target","Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.184 + 100.64.69.184 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.79 + USER-0015-1485.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1686614815 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3531a7c0-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3531a7c0-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3531a7c0-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3531a7c0-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3531a7c0-097e-11ee-8b37-9ba18759a170 + + + INCIDENT_LINK + 1686614815 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3531a7c0-097e-11ee-8b37-9ba18759a170 + + + diff --git a/graph/incidents_graphml/3/3532d360-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/3532d360-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..63661850658828fd7d0f05a9903fbd8ce16efbbb --- /dev/null +++ b/graph/incidents_graphml/3/3532d360-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.9 + 100.64.53.9 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3532d360-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/35366ce0-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/35366ce0-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50548560da4d1c157f0bee2548dd2ce23087bc23 --- /dev/null +++ b/graph/incidents_graphml/3/35366ce0-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.220 + 100.64.4.220 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657204 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 35366ce0-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/35487e40-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/35487e40-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..236e9bbd6fecbaef22b50bf1f2956276aaaf3821 --- /dev/null +++ b/graph/incidents_graphml/3/35487e40-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.9 + 100.64.53.9 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339709 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35487e40-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/354a2a40-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/3/354a2a40-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8eb3375b1175327511dd3d42376fe7b3a35758e6 --- /dev/null +++ b/graph/incidents_graphml/3/354a2a40-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.196 + 100.64.28.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.63 + USER-0015-1644.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 354a2a40-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 354a2a40-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/3/3554d690-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3554d690-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52cec8aa925d615d804e3c1d49006e62ba2e5ded --- /dev/null +++ b/graph/incidents_graphml/3/3554d690-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.81.19 + USER-0015-1854.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199014 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3554d690-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/35562a50-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/3/35562a50-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ca9c9a8305499fbda725064ff3c9eeead0b0a6d --- /dev/null +++ b/graph/incidents_graphml/3/35562a50-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.235 + 100.64.37.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.236 + 100.64.37.236 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.91 + 100.64.18.91 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159238 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35562a50-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/3/3565d030-f0f6-11ee-9141-97f57fdeb7f9.graphml b/graph/incidents_graphml/3/3565d030-f0f6-11ee-9141-97f57fdeb7f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ab0c57e37f908d124f60a9e84e350c4d3c5c3b9 --- /dev/null +++ b/graph/incidents_graphml/3/3565d030-f0f6-11ee-9141-97f57fdeb7f9.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.83.120.212 + 10.83.120.212 + ["Exploiting Host"] + 0.841796875 + ["Precinct","PAN NGFW","Windows Active Directory"] + + + HOST + 100.64.69.152 + 100.64.69.152 + ["Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.153 + USER-0015-1523.example.internal + ["Exploiting Target"] + 0.7890625 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.154 + 100.64.69.154 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.100 + 100.64.68.100 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.69.155 + 100.64.69.155 + ["Exploiting Target"] + 0.4375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + INCIDENT_LINK + 1712065074 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3565d030-f0f6-11ee-9141-97f57fdeb7f9 + + + diff --git a/graph/incidents_graphml/3/357132b0-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/357132b0-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dbcb905072e000285636f4885b2e8a6e0bdf3b37 --- /dev/null +++ b/graph/incidents_graphml/3/357132b0-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.68.1 + 100.64.68.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477051 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 357132b0-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/357626a0-299b-11ef-bcba-e72095bb0d10.graphml b/graph/incidents_graphml/3/357626a0-299b-11ef-bcba-e72095bb0d10.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08a0385f09455092e3eb44eea12d6395b389e254 --- /dev/null +++ b/graph/incidents_graphml/3/357626a0-299b-11ef-bcba-e72095bb0d10.graphml @@ -0,0 +1,179 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.69 + 100.64.60.69 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.70 + 100.64.60.70 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.159 + 100.64.32.159 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + INCIDENT_LINK + 1718293206 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 357626a0-299b-11ef-bcba-e72095bb0d10 + + + diff --git a/graph/incidents_graphml/3/3577f2b0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/3577f2b0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44319efc86ad20d61e76dbc40808d3f61df5b33d --- /dev/null +++ b/graph/incidents_graphml/3/3577f2b0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.28 + USER-0015-1345.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339709 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3577f2b0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/357f1560-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/357f1560-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5fca6b1fbcf71f484f20ca92bdfa348d94595f04 --- /dev/null +++ b/graph/incidents_graphml/3/357f1560-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 357f1560-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/3589e9b0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3589e9b0-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2aa43c1e3c0e7bdff5338e62713b13afd4d0bb5 --- /dev/null +++ b/graph/incidents_graphml/3/3589e9b0-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.16 + 100.64.57.16 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597075 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3589e9b0-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/358b7ab0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/358b7ab0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43f92fe4e042d50c0ff6d8530bb23a5ffd908c4b --- /dev/null +++ b/graph/incidents_graphml/3/358b7ab0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.28 + USER-0015-1345.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339710 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 358b7ab0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/358d9450-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/358d9450-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c4c6458374178ec3cc80ffc6c4ddfdd339766c8 --- /dev/null +++ b/graph/incidents_graphml/3/358d9450-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.58 + 100.64.21.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477052 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 358d9450-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/359184a0-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/359184a0-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff6e26bc3b710749451012a3d25b5006528346c5 --- /dev/null +++ b/graph/incidents_graphml/3/359184a0-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.161 + 100.64.45.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783546 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 359184a0-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/35976d90-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/35976d90-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09299b0d9366ab50b3338f2ea7c602b4271f973b --- /dev/null +++ b/graph/incidents_graphml/3/35976d90-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.50 + 100.64.80.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + USER-0015-1727.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.80.51 + 100.64.80.51 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1677324372 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35976d90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324372 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35976d90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324372 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35976d90-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324372 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35976d90-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/3/359e3620-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/359e3620-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea3760eaa39f512dfc7aeac2b99d48bd65838474 --- /dev/null +++ b/graph/incidents_graphml/3/359e3620-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.68.1 + 100.64.68.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477052 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 359e3620-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/359ecb10-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/359ecb10-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe80af53988d67d0e4bce9e14d83f7541122e8a3 --- /dev/null +++ b/graph/incidents_graphml/3/359ecb10-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.110 + 100.64.22.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783546 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 359ecb10-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/35a76780-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/35a76780-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..212309457a1f7761c55e135a7d4190ce37d4cb68 --- /dev/null +++ b/graph/incidents_graphml/3/35a76780-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.22 + 100.64.53.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934895 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35a76780-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/35ae0d50-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/35ae0d50-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62d1f390922c71c07a75246c58747be35ec5014a --- /dev/null +++ b/graph/incidents_graphml/3/35ae0d50-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.110 + 100.64.22.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783546 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 35ae0d50-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/35b74600-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/35b74600-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f707ecd61110626d5026ea10f45840bc95081436 --- /dev/null +++ b/graph/incidents_graphml/3/35b74600-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.22 + 100.64.53.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934895 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 35b74600-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/35b7a470-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35b7a470-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd0f23d0fa039a5a881aee69bb8f29866f508e4a --- /dev/null +++ b/graph/incidents_graphml/3/35b7a470-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.233 + 100.64.93.233 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35b7a470-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35be5b30-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35be5b30-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af5696a60042842b65b7dcbbf11655b0fe1cd80d --- /dev/null +++ b/graph/incidents_graphml/3/35be5b30-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.233 + 100.64.93.233 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 35be5b30-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35c8bb70-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35c8bb70-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9449668d12d9bb9170a6803bd22f9e313d8aa68 --- /dev/null +++ b/graph/incidents_graphml/3/35c8bb70-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.234 + 100.64.93.234 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35c8bb70-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35cace00-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/35cace00-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7459ab8c5e927681d153cfb1dbc4977a05bef007 --- /dev/null +++ b/graph/incidents_graphml/3/35cace00-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.24 + 100.64.53.24 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934895 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 35cace00-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/35cf7230-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35cf7230-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b07c8dc18c86a7bcc4f54690fc7f5e9f022a7164 --- /dev/null +++ b/graph/incidents_graphml/3/35cf7230-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.234 + 100.64.93.234 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 35cf7230-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35deb470-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35deb470-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76c710464a7eb054874d3ff666350e92afef554a --- /dev/null +++ b/graph/incidents_graphml/3/35deb470-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.239 + 100.64.93.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35deb470-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35e5e060-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35e5e060-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f29569cb06affa361340872f1d74eb2e6efc156 --- /dev/null +++ b/graph/incidents_graphml/3/35e5e060-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.239 + 100.64.93.239 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 35e5e060-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35ea1cb0-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/35ea1cb0-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7704ca13e14562bb635ea6a1c187f9d54689f491 --- /dev/null +++ b/graph/incidents_graphml/3/35ea1cb0-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.88 + 100.64.49.88 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692507 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35ea1cb0-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/3/35ebd3d0-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35ebd3d0-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..05535df3233a353d7bb2281e2269f9ce05b4c653 --- /dev/null +++ b/graph/incidents_graphml/3/35ebd3d0-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.235 + 100.64.93.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 35ebd3d0-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35f5e5f0-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/35f5e5f0-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40c12056d007dc52ca76f0c3b76a27072f289fc7 --- /dev/null +++ b/graph/incidents_graphml/3/35f5e5f0-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.93.235 + 100.64.93.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662420836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 35f5e5f0-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/35f680b0-2a33-11ee-9959-8506340212c8.graphml b/graph/incidents_graphml/3/35f680b0-2a33-11ee-9959-8506340212c8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d724520933d514aa9f31a94f2bfab7c900fb6d0 --- /dev/null +++ b/graph/incidents_graphml/3/35f680b0-2a33-11ee-9959-8506340212c8.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.165 + 100.64.68.165 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.34.133 + 100.64.34.133 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.166 + 100.64.68.166 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1690210993 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35f680b0-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210993 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35f680b0-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210993 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35f680b0-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210993 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35f680b0-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210993 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35f680b0-2a33-11ee-9959-8506340212c8 + + + INCIDENT_LINK + 1690210993 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35f680b0-2a33-11ee-9959-8506340212c8 + + + diff --git a/graph/incidents_graphml/3/35ff5260-3655-11ef-872b-bfba974a2ef0.graphml b/graph/incidents_graphml/3/35ff5260-3655-11ef-872b-bfba974a2ef0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf3dc59f4ef978e03f9d050f51bc9add4106843c --- /dev/null +++ b/graph/incidents_graphml/3/35ff5260-3655-11ef-872b-bfba974a2ef0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.88 + 100.64.49.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719692507 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 35ff5260-3655-11ef-872b-bfba974a2ef0 + + + diff --git a/graph/incidents_graphml/3/360b3260-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/360b3260-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4441a29ea27b4aa7b61022a389f6326b7c562f75 --- /dev/null +++ b/graph/incidents_graphml/3/360b3260-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.196 + 100.64.33.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934896 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 360b3260-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/360eff80-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/360eff80-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c310a6f0d3ba0492bae34dcb70c4b69804b82e18 --- /dev/null +++ b/graph/incidents_graphml/3/360eff80-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.50 + 100.64.16.50 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833306 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 360eff80-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/361108b0-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/361108b0-5e3f-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4c2e76d46adeb70a70ba8df0568db9cac46684c7 --- /dev/null +++ b/graph/incidents_graphml/3/361108b0-5e3f-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.193 + 100.64.75.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.1.188 + HOST-14751 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667786110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 361108b0-5e3f-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667786110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 361108b0-5e3f-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/3/36143d00-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/36143d00-5e3f-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b86d4a91ec9870cf7862e46edd94bfda063b525a --- /dev/null +++ b/graph/incidents_graphml/3/36143d00-5e3f-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.222 + 100.64.25.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.238 + 100.64.71.238 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1667786110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36143d00-5e3f-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667786110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36143d00-5e3f-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/3/361dcc90-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/361dcc90-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6095c136d0bec6d3ea06cf718d9a07b7a2c83c95 --- /dev/null +++ b/graph/incidents_graphml/3/361dcc90-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.50 + 100.64.16.50 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 361dcc90-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/36221ee0-920d-11ee-afdd-6dc3cf6fdc52.graphml b/graph/incidents_graphml/3/36221ee0-920d-11ee-afdd-6dc3cf6fdc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ab1f284efb3cbdaf26439eb512a51d175c91bcb --- /dev/null +++ b/graph/incidents_graphml/3/36221ee0-920d-11ee-afdd-6dc3cf6fdc52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.176 + 100.64.35.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701629593 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36221ee0-920d-11ee-afdd-6dc3cf6fdc52 + + + diff --git a/graph/incidents_graphml/3/3628a570-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/3628a570-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2c47b03c7d37812ae84f23219fbc7a2e3789764 --- /dev/null +++ b/graph/incidents_graphml/3/3628a570-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.26 + 100.64.53.26 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934896 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3628a570-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/362c2c40-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/362c2c40-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1364d4c1a39bc19fc0d0c690a32f524cfb0611b --- /dev/null +++ b/graph/incidents_graphml/3/362c2c40-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.185 + 100.64.20.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685210363 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 362c2c40-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/362d5cf0-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/362d5cf0-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..269929c51d39d138c63d1746554fb734624a1762 --- /dev/null +++ b/graph/incidents_graphml/3/362d5cf0-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833306 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 362d5cf0-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/36368ca0-e31f-11ee-acbf-dfdefbfef3c0.graphml b/graph/incidents_graphml/3/36368ca0-e31f-11ee-acbf-dfdefbfef3c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba74de41090ffd24b2c50e8f7633b8ce0125c1bd --- /dev/null +++ b/graph/incidents_graphml/3/36368ca0-e31f-11ee-acbf-dfdefbfef3c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.110 + 100.64.26.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW","Protect"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1710543368 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36368ca0-e31f-11ee-acbf-dfdefbfef3c0 + + + diff --git a/graph/incidents_graphml/3/3638d210-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/3638d210-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c68f0832c7a49d6f584d9e6ee3727b3a026a9d6 --- /dev/null +++ b/graph/incidents_graphml/3/3638d210-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934896 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3638d210-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/363e2c60-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/363e2c60-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9fbeb8c4c19fc06a22d21be374b1daab3948b3d9 --- /dev/null +++ b/graph/incidents_graphml/3/363e2c60-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661661057 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 363e2c60-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/363f02b0-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/363f02b0-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9209904c644e6e552dbe7bd5fc0499f715ce6aad --- /dev/null +++ b/graph/incidents_graphml/3/363f02b0-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.199 + 100.64.16.199 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783547 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 363f02b0-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/363f1030-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/363f1030-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2808a28a56177939a8fa2296788c8d6a88ed599 --- /dev/null +++ b/graph/incidents_graphml/3/363f1030-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.52 + 100.64.16.52 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833306 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 363f1030-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/363f79f0-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/363f79f0-27a9-11ee-82e1-59dd32b62381.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e73db2a3195c797a338cbe0d96eafd8b2894400f --- /dev/null +++ b/graph/incidents_graphml/3/363f79f0-27a9-11ee-82e1-59dd32b62381.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.69 + 100.64.25.69 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689931821 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 363f79f0-27a9-11ee-82e1-59dd32b62381 + + + diff --git a/graph/incidents_graphml/3/3647ed40-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/3647ed40-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48664795e0b6e2346e71d811661dbc404e02b0a3 --- /dev/null +++ b/graph/incidents_graphml/3/3647ed40-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934896 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3647ed40-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/36497710-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36497710-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a11f3b99dc44ca8702e7edb128aa0f514bd9335b --- /dev/null +++ b/graph/incidents_graphml/3/36497710-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.211 + 100.64.12.211 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684930761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36497710-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/364aa0b0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/364aa0b0-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb96afbf00c2e908b41e276e7bb3fa004c78c5ac --- /dev/null +++ b/graph/incidents_graphml/3/364aa0b0-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.75 + 100.64.47.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665103 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 364aa0b0-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/364d6810-8acf-11ee-bba1-ef6459fc1a52.graphml b/graph/incidents_graphml/3/364d6810-8acf-11ee-bba1-ef6459fc1a52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0661afbb87d861fe3e367f6bd84030b13674a8bd --- /dev/null +++ b/graph/incidents_graphml/3/364d6810-8acf-11ee-bba1-ef6459fc1a52.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.52 + 100.64.16.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700833306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 364d6810-8acf-11ee-bba1-ef6459fc1a52 + + + diff --git a/graph/incidents_graphml/3/364e31f0-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/364e31f0-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35fba75cf6aa32cfc7f72731ee3591e652c93e7a --- /dev/null +++ b/graph/incidents_graphml/3/364e31f0-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661661057 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 364e31f0-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/36538920-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/36538920-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb0bfe0d9f4b2b79699c406f4df10f0b903a6a37 --- /dev/null +++ b/graph/incidents_graphml/3/36538920-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.93 + 100.64.73.93 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661661057 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36538920-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/36542240-5e42-11ee-a40d-8da4c06aaa42.graphml b/graph/incidents_graphml/3/36542240-5e42-11ee-a40d-8da4c06aaa42.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ecff23921947d79321409e7b58c4043424e5940 --- /dev/null +++ b/graph/incidents_graphml/3/36542240-5e42-11ee-a40d-8da4c06aaa42.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.28 + 100.64.53.28 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695934896 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36542240-5e42-11ee-a40d-8da4c06aaa42 + + + diff --git a/graph/incidents_graphml/3/365458f0-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/365458f0-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54dc1190730097129be3d3a7460339333fbe3810 --- /dev/null +++ b/graph/incidents_graphml/3/365458f0-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821668 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 365458f0-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/365b5150-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/365b5150-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd744f00556e90e34bef94327ce0cb148db2b85e --- /dev/null +++ b/graph/incidents_graphml/3/365b5150-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661661057 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 365b5150-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/365fe530-268a-11ed-ad3b-a34fab330a0e.graphml b/graph/incidents_graphml/3/365fe530-268a-11ed-ad3b-a34fab330a0e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5497a3f8f8cdcda7e9743c2f80c06aa4a7756887 --- /dev/null +++ b/graph/incidents_graphml/3/365fe530-268a-11ed-ad3b-a34fab330a0e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.202 + 100.64.72.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.3.77 + 100.64.3.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661661057 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 365fe530-268a-11ed-ad3b-a34fab330a0e + + + diff --git a/graph/incidents_graphml/3/36683bc0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/36683bc0-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5360ed2a47e986f26e017e81a171d173fd98f9d --- /dev/null +++ b/graph/incidents_graphml/3/36683bc0-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.18 + 100.64.57.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597077 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36683bc0-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/366cbfc0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/366cbfc0-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c86a91d0b2532b331ff2700c85a17b1bc82cdddb --- /dev/null +++ b/graph/incidents_graphml/3/366cbfc0-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.155 + 100.64.76.155 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.144 + 100.64.72.144 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685893692 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 366cbfc0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893692 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 366cbfc0-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/3/36714a60-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36714a60-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a7618e57d7ec326d5975b7c09a8bdb7bf47ea47 --- /dev/null +++ b/graph/incidents_graphml/3/36714a60-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.211 + 100.64.12.211 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684930761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36714a60-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/36749f80-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/36749f80-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c8d9ba343235fd4ed2e2d224484e4426403f95a --- /dev/null +++ b/graph/incidents_graphml/3/36749f80-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469849 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36749f80-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/3/367707e0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/367707e0-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04da129eed80c96441e3695c3d2add6bcf4abad5 --- /dev/null +++ b/graph/incidents_graphml/3/367707e0-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.75 + 100.64.47.75 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665103 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 367707e0-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/3682a6d0-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/3682a6d0-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..876a1b193239c6999998fb91964cc16a07eabc5c --- /dev/null +++ b/graph/incidents_graphml/3/3682a6d0-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.164 + 100.64.34.164 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3682a6d0-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/36832df0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/36832df0-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed6bf3b7316b33b4d1e9ff29cb2abc037a4748dd --- /dev/null +++ b/graph/incidents_graphml/3/36832df0-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.74 + 100.64.30.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.1.55 + 100.64.1.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685893693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36832df0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893693 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36832df0-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/3/36908980-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/36908980-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5cb43279182fd4afa4f22acf9ba1d6d9f86e856 --- /dev/null +++ b/graph/incidents_graphml/3/36908980-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.125 + 100.64.58.125 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437276 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36908980-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/369218d0-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/369218d0-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..17ce9cfab9a4e581ee47dca8e849fd398ba2883a --- /dev/null +++ b/graph/incidents_graphml/3/369218d0-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.213 + 100.64.12.213 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684930761 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 369218d0-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/36967f60-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/36967f60-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2202ab0bab24d0858a89cf5aa60a997335aadd81 --- /dev/null +++ b/graph/incidents_graphml/3/36967f60-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.16 + 100.64.9.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469849 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36967f60-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/3/369a4840-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/369a4840-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4602e3ed0ca5893a992867d76ac12fa845c6ef16 --- /dev/null +++ b/graph/incidents_graphml/3/369a4840-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.18 + 100.64.57.18 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597077 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 369a4840-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/36b36410-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/3/36b36410-fec6-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59197dcff91697c58adc59b7e2f2c3cb5bf68c80 --- /dev/null +++ b/graph/incidents_graphml/3/36b36410-fec6-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.112 + 100.64.22.112 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.146 + 100.64.24.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.147 + 100.64.24.147 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.107 + 100.64.18.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.148 + 100.64.24.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.149 + 100.64.24.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b36410-fec6-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/3/36b46130-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/36b46130-70fa-11ee-8198-9db2a0bce259.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0efb6718c56685a18574ae6c83d332bd7ce8ef62 --- /dev/null +++ b/graph/incidents_graphml/3/36b46130-70fa-11ee-8198-9db2a0bce259.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.12 + 100.64.17.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697993045 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 36b46130-70fa-11ee-8198-9db2a0bce259 + + + diff --git a/graph/incidents_graphml/3/36b5b250-4404-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/3/36b5b250-4404-11ef-b0b5-17c176975c0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ae1436505b718f022393c1e81af3ec7eebaac8b --- /dev/null +++ b/graph/incidents_graphml/3/36b5b250-4404-11ef-b0b5-17c176975c0f.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.137 + 100.64.50.137 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.138 + 100.64.50.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.137 + 100.64.16.137 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197036 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36b5b250-4404-11ef-b0b5-17c176975c0f + + + diff --git a/graph/incidents_graphml/3/36b9dd40-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/36b9dd40-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f20fe44a051ac46d1da0381d43c9602983d1655d --- /dev/null +++ b/graph/incidents_graphml/3/36b9dd40-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.77 + 100.64.47.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665104 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36b9dd40-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/36bf8bf0-e873-11ee-9a77-df185ba75d8e.graphml b/graph/incidents_graphml/3/36bf8bf0-e873-11ee-9a77-df185ba75d8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8a2cd9de6885e1dca22e33637c4b0aef0094fd5 --- /dev/null +++ b/graph/incidents_graphml/3/36bf8bf0-e873-11ee-9a77-df185ba75d8e.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.89 + 100.64.49.89 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + HOST + 100.64.70.193 + 100.64.70.193 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1711129203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36bf8bf0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36bf8bf0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36bf8bf0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36bf8bf0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36bf8bf0-e873-11ee-9a77-df185ba75d8e + + + INCIDENT_LINK + 1711129203 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36bf8bf0-e873-11ee-9a77-df185ba75d8e + + + diff --git a/graph/incidents_graphml/3/36bfcea0-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/36bfcea0-6590-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..641d75b1c30669c30f0442a113bfadaf1b57ac8d --- /dev/null +++ b/graph/incidents_graphml/3/36bfcea0-6590-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.52 + 100.64.32.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.53 + 100.64.32.53 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.54 + 100.64.32.54 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.100 + 100.64.21.100 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.62 + 100.64.26.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.55 + 100.64.32.55 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.56 + 100.64.32.56 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.57 + 100.64.32.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738056 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36bfcea0-6590-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/3/36c47b10-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/3/36c47b10-fec6-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea0eb53419913a18532bc487c3bd63e54340b964 --- /dev/null +++ b/graph/incidents_graphml/3/36c47b10-fec6-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.154 + 100.64.24.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.155 + 100.64.24.155 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.55 + 100.64.16.55 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c47b10-fec6-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/3/36c4e580-1dab-11ed-b2e7-abaef9f1b8f2.graphml b/graph/incidents_graphml/3/36c4e580-1dab-11ed-b2e7-abaef9f1b8f2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f63a56f664bcc4c3c0289c6951a6168b709d0b35 --- /dev/null +++ b/graph/incidents_graphml/3/36c4e580-1dab-11ed-b2e7-abaef9f1b8f2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.120 + 100.64.76.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.58 + 100.64.1.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.121 + 100.64.76.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660685671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2 + + + INCIDENT_LINK + 1660685671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36c4e580-1dab-11ed-b2e7-abaef9f1b8f2 + + + diff --git a/graph/incidents_graphml/3/36c67b60-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/36c67b60-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa9f8f8adf10f42f3a41bcde02b5bac0301eb3d0 --- /dev/null +++ b/graph/incidents_graphml/3/36c67b60-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.97 + 100.64.35.97 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36c67b60-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/3/36ca9a60-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/36ca9a60-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c73379216681b3ed59034789ab1f9e6e73609e3d --- /dev/null +++ b/graph/incidents_graphml/3/36ca9a60-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.3.149 + 100.64.3.149 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821669 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36ca9a60-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/36cdae20-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/36cdae20-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66635937b61d14c655f4a43c6a1ef9ce4db7e530 --- /dev/null +++ b/graph/incidents_graphml/3/36cdae20-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.126 + 100.64.49.126 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36cdae20-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/36ce3d50-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/36ce3d50-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..619c51bf94af6f6e1457a75da20af0822dcf7798 --- /dev/null +++ b/graph/incidents_graphml/3/36ce3d50-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.31 + 100.64.15.31 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197583 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36ce3d50-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197583 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36ce3d50-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/36d20fa0-fec6-11ee-beca-89f62fdf83e2.graphml b/graph/incidents_graphml/3/36d20fa0-fec6-11ee-beca-89f62fdf83e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a906a78243c71b6928ed5530d9b3dbbcf48db259 --- /dev/null +++ b/graph/incidents_graphml/3/36d20fa0-fec6-11ee-beca-89f62fdf83e2.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.160 + 100.64.24.160 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.24.161 + 100.64.24.161 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + INCIDENT_LINK + 1713583777 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36d20fa0-fec6-11ee-beca-89f62fdf83e2 + + + diff --git a/graph/incidents_graphml/3/36d48c80-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/36d48c80-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a05dcdad19c0d61a239f8a00c966cb54e2a3edd2 --- /dev/null +++ b/graph/incidents_graphml/3/36d48c80-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.138 + 100.64.19.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657207 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36d48c80-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/36d5ffa0-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36d5ffa0-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dc4ac961ca0764f85edfebec1cda04fe61e41a50 --- /dev/null +++ b/graph/incidents_graphml/3/36d5ffa0-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.42 + 100.64.11.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684930762 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36d5ffa0-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/36da80c0-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/36da80c0-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eaa91bfb6a7fccf53585e3eaef453f1e8c12e80c --- /dev/null +++ b/graph/incidents_graphml/3/36da80c0-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.86 + 100.64.40.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1703474283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36da80c0-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/36db20e0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/36db20e0-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9544b0129d737238d75cebf4f9d7bfdda3956c10 --- /dev/null +++ b/graph/incidents_graphml/3/36db20e0-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.119 + 100.64.13.119 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665104 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36db20e0-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/36dcf060-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/36dcf060-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2701fd657b9566784c37b245191f40812e5a078e --- /dev/null +++ b/graph/incidents_graphml/3/36dcf060-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.126 + 100.64.49.126 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783548 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36dcf060-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/36ddfb00-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/36ddfb00-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a7183d02e848c5fb2bb34d3e73e16f842349855 --- /dev/null +++ b/graph/incidents_graphml/3/36ddfb00-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.97 + 100.64.35.97 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723266 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36ddfb00-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/3/36e86370-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/36e86370-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7494fa35a9c4babe0f488541026773c3a467808 --- /dev/null +++ b/graph/incidents_graphml/3/36e86370-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.40.86 + 100.64.40.86 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 36e86370-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/36edb940-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/36edb940-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93fb48c31709af6c1b975a1dcb52415396c78326 --- /dev/null +++ b/graph/incidents_graphml/3/36edb940-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.183 + 100.64.67.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36edb940-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/36ef8e90-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/36ef8e90-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..493055e85cd71d8ebff0bc6e63c9cb999b840220 --- /dev/null +++ b/graph/incidents_graphml/3/36ef8e90-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.138 + 100.64.19.138 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657207 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 36ef8e90-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/36f0e6c0-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/36f0e6c0-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f75b874697240183f4a7feb8d1f1b775414b51e1 --- /dev/null +++ b/graph/incidents_graphml/3/36f0e6c0-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.105 + 100.64.35.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723266 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36f0e6c0-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/3/36f5bca0-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/36f5bca0-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61209f20ff2dc7c62bf2bc172813caa42a53127a --- /dev/null +++ b/graph/incidents_graphml/3/36f5bca0-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.11.42 + 100.64.11.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684930762 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 36f5bca0-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/36f6e260-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/36f6e260-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80055658d631b427fd74e7146ae9fc26134d665b --- /dev/null +++ b/graph/incidents_graphml/3/36f6e260-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.94.108 + 100.64.94.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 36f6e260-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/36fe6050-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/36fe6050-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f92e0224bfc9c027d437b69d60bf114f72d7227 --- /dev/null +++ b/graph/incidents_graphml/3/36fe6050-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.119 + 100.64.13.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 36fe6050-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/36ffe8d0-3ca7-11ee-874c-c948d9dda210.graphml b/graph/incidents_graphml/3/36ffe8d0-3ca7-11ee-874c-c948d9dda210.graphml new file mode 100644 index 0000000000000000000000000000000000000000..778801fd1d4983e67249934a0e343a44c1330ae3 --- /dev/null +++ b/graph/incidents_graphml/3/36ffe8d0-3ca7-11ee-874c-c948d9dda210.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.145 + 100.64.41.145 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692239937 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 36ffe8d0-3ca7-11ee-874c-c948d9dda210 + + + diff --git a/graph/incidents_graphml/3/3702e820-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/3702e820-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d040ccb4a9758f0b76eefb30a1dc6b65cf5d6e01 --- /dev/null +++ b/graph/incidents_graphml/3/3702e820-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.105 + 100.64.35.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723267 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3702e820-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/3/37044e80-4ab1-11ee-b857-e5551c73ae93.graphml b/graph/incidents_graphml/3/37044e80-4ab1-11ee-b857-e5551c73ae93.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d3ff43ebd25e4d4106235b0230fba24663a035b0 --- /dev/null +++ b/graph/incidents_graphml/3/37044e80-4ab1-11ee-b857-e5551c73ae93.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.183 + 100.64.67.183 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693783548 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37044e80-4ab1-11ee-b857-e5551c73ae93 + + + diff --git a/graph/incidents_graphml/3/370e3a20-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/370e3a20-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a564d569d57dcb323cf57682086a078ee2ea3f1 --- /dev/null +++ b/graph/incidents_graphml/3/370e3a20-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657207 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 370e3a20-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/3710abf0-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/3710abf0-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92cb5f16af7035affd6bc1a1f8f33271482aab01 --- /dev/null +++ b/graph/incidents_graphml/3/3710abf0-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.109 + 100.64.94.109 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1703474283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3710abf0-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/3717b4b0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/3717b4b0-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..889dbf6180f9c2208f6110a8905a2907cf78e78a --- /dev/null +++ b/graph/incidents_graphml/3/3717b4b0-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.47.79 + 100.64.47.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3717b4b0-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/37195650-246c-11ef-b309-557c2f3770a9.graphml b/graph/incidents_graphml/3/37195650-246c-11ef-b309-557c2f3770a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..070ad932cfa19907e7275acc777ae04fab8be539 --- /dev/null +++ b/graph/incidents_graphml/3/37195650-246c-11ef-b309-557c2f3770a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.100 + 100.64.35.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717723267 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37195650-246c-11ef-b309-557c2f3770a9 + + + diff --git a/graph/incidents_graphml/3/3720d890-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/3720d890-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c882f0f1d9a224d0268251ccb60a3167b132050 --- /dev/null +++ b/graph/incidents_graphml/3/3720d890-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.94.109 + 100.64.94.109 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1703474283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3720d890-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/37226940-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37226940-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed34325c199eed5248630ec54e5421a9b0e9d780 --- /dev/null +++ b/graph/incidents_graphml/3/37226940-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.127 + 100.64.58.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437277 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37226940-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/372c7080-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/372c7080-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffee32a4adb0e0525a80819520f0a7b7ca3de437 --- /dev/null +++ b/graph/incidents_graphml/3/372c7080-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657207 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 372c7080-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/372e3330-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/372e3330-11b9-11ed-a4c1-252f95debd7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08bd99671458baefe38e664d042a1e30c5d0f2fe --- /dev/null +++ b/graph/incidents_graphml/3/372e3330-11b9-11ed-a4c1-252f95debd7b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.132.192 + 192.168.132.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.0.105 + 100.64.0.105 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659372271 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 372e3330-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372271 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 372e3330-11b9-11ed-a4c1-252f95debd7b + + + diff --git a/graph/incidents_graphml/3/37315d60-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37315d60-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2208966283c2bd7066d979807e4571a746d7ada0 --- /dev/null +++ b/graph/incidents_graphml/3/37315d60-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.127 + 100.64.58.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437277 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37315d60-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/3732a570-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3732a570-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f588d0e639450d2b6fdcd7ddb6b9ba5a1c6f8ed4 --- /dev/null +++ b/graph/incidents_graphml/3/3732a570-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.86 + 100.64.52.86 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.234 + 100.64.71.234 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690703198 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3732a570-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/373c0590-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/373c0590-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..abd1eb30a83bb8b6bcbad97369a00778f9cacc74 --- /dev/null +++ b/graph/incidents_graphml/3/373c0590-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.79 + 100.64.47.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665105 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 373c0590-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/373e8570-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/373e8570-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be32a9ccb0286359c2844a144972c8c582345ac1 --- /dev/null +++ b/graph/incidents_graphml/3/373e8570-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684930762 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 373e8570-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/373f1900-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/373f1900-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a25cab2c9bf7fa422b1eb87b5a103413b72493b --- /dev/null +++ b/graph/incidents_graphml/3/373f1900-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.106 + 100.64.19.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437277 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 373f1900-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/37432da0-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/37432da0-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..caf8e70b9b1f1dad1b945809e8b367186f15b82c --- /dev/null +++ b/graph/incidents_graphml/3/37432da0-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474283 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37432da0-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/3744a670-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3744a670-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12ccb286c52a7865fa77f831f57c594b8aec3807 --- /dev/null +++ b/graph/incidents_graphml/3/3744a670-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.159 + 100.64.52.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3744a670-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/374b1500-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/374b1500-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62b1f24c3a29916c97e1b888c25893ce2a275609 --- /dev/null +++ b/graph/incidents_graphml/3/374b1500-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.64 + 100.64.56.64 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 374b1500-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/374e0d20-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/374e0d20-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ee38844c647acccc5542938a48f7d8499589922 --- /dev/null +++ b/graph/incidents_graphml/3/374e0d20-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.106 + 100.64.19.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437278 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 374e0d20-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/37504d00-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/37504d00-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f811d5a4eeebd40cfe7582ab8d5dea3140ea7c2b --- /dev/null +++ b/graph/incidents_graphml/3/37504d00-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.112 + 100.64.94.112 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1703474284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37504d00-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/37540fc0-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/37540fc0-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a72e8983580af4197522374584301203ab8ad4cf --- /dev/null +++ b/graph/incidents_graphml/3/37540fc0-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.159 + 100.64.52.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261350 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37540fc0-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/37588990-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/37588990-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98e879d343a023dbb5c1e7bfbe52fff7eea3f183 --- /dev/null +++ b/graph/incidents_graphml/3/37588990-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.140 + 100.64.19.140 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657208 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37588990-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/3758d450-3caa-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/3/3758d450-3caa-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ebf1711a8710275db9207c867c538d3b43b1052 --- /dev/null +++ b/graph/incidents_graphml/3/3758d450-3caa-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.27 + 100.64.12.27 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.90.172 + 100.64.90.172 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720388724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3758d450-3caa-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720388724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3758d450-3caa-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720388724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3758d450-3caa-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720388724 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3758d450-3caa-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/3/375f8760-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/375f8760-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25c64dd0a8eb4612d99391caf8746e0a366e5446 --- /dev/null +++ b/graph/incidents_graphml/3/375f8760-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.56.64 + 100.64.56.64 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821670 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 375f8760-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/37605290-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/37605290-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b61434bb7324e9e786998787598c90417cbe0a5 --- /dev/null +++ b/graph/incidents_graphml/3/37605290-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.94.112 + 100.64.94.112 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1703474284 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37605290-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/3761a4b0-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3761a4b0-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dde58be3db106afa3d138335ba5c5fc1db2d658 --- /dev/null +++ b/graph/incidents_graphml/3/3761a4b0-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.186 + 100.64.73.186 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690703198 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3761a4b0-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/3762ea70-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3762ea70-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac1b41b861722bbf4f0b5c1cc7114a616b4719ae --- /dev/null +++ b/graph/incidents_graphml/3/3762ea70-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.62 + 100.64.18.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3762ea70-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/3765b640-35a6-11ee-b049-cb5bed92530e.graphml b/graph/incidents_graphml/3/3765b640-35a6-11ee-b049-cb5bed92530e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3294b6bc7bc430075439bed8a818b6e996e06885 --- /dev/null +++ b/graph/incidents_graphml/3/3765b640-35a6-11ee-b049-cb5bed92530e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.227 + 100.64.55.227 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691469850 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3765b640-35a6-11ee-b049-cb5bed92530e + + + diff --git a/graph/incidents_graphml/3/376ab200-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/376ab200-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf1432b9be64d25795894c74ed8b67d8760ffd1c --- /dev/null +++ b/graph/incidents_graphml/3/376ab200-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.173 + 100.64.67.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462514 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 376ab200-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/3/3770a610-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3770a610-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a673ee0d339f7a9ac5746180cc870eb9966a8bb --- /dev/null +++ b/graph/incidents_graphml/3/3770a610-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.62 + 100.64.18.62 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868458 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3770a610-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/37735d80-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37735d80-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5d543e61aa0eef88942a90cd3c61eb7b3a399256 --- /dev/null +++ b/graph/incidents_graphml/3/37735d80-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821670 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37735d80-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/37749070-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37749070-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68fb07bec25685208f972330b23ac53f9283fc9d --- /dev/null +++ b/graph/incidents_graphml/3/37749070-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.186 + 100.64.73.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690703199 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37749070-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/3775cd90-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/3775cd90-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26eb9e9b96eb35f7c08ce258f344b813cb008822 --- /dev/null +++ b/graph/incidents_graphml/3/3775cd90-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.39 + 100.64.14.39 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.190 + 100.64.72.190 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.170 + 100.64.81.170 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.171 + 100.64.81.171 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1665146425 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3775cd90-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146425 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3775cd90-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146425 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3775cd90-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146425 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3775cd90-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146425 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3775cd90-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/3/377787f0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/377787f0-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c858df27ccf67bbc23f434c6a9f659dc20f9010 --- /dev/null +++ b/graph/incidents_graphml/3/377787f0-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.81 + 100.64.47.81 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665105 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 377787f0-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/377bb6f0-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/377bb6f0-11b9-11ed-a4c1-252f95debd7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6b18d0e883cd76ecc34d04f8dfe80eab09f6b77 --- /dev/null +++ b/graph/incidents_graphml/3/377bb6f0-11b9-11ed-a4c1-252f95debd7b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.246 + 100.64.80.246 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.92 + 100.64.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.247 + 100.64.80.247 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659372271 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 377bb6f0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372271 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 377bb6f0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372271 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 377bb6f0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372271 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 377bb6f0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372271 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 377bb6f0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372271 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 377bb6f0-11b9-11ed-a4c1-252f95debd7b + + + diff --git a/graph/incidents_graphml/3/378cfa70-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/378cfa70-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2120326a9b652d83426540dc57660924c2e7a4e --- /dev/null +++ b/graph/incidents_graphml/3/378cfa70-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,387 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.226 + 100.64.12.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.196 + 100.64.73.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.121 + 100.64.71.121 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.36.105 + 100.64.36.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.57.248 + 100.64.57.248 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.156 + 100.64.71.156 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.128 + 100.64.7.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.14.110 + 100.64.14.110 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.197 + 100.64.73.197 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 378cfa70-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/378e1880-1a4c-11ee-a525-9fcef38978a9.graphml b/graph/incidents_graphml/3/378e1880-1a4c-11ee-a525-9fcef38978a9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3f6f157622dbc477b957088e32a1a64ac151cbc --- /dev/null +++ b/graph/incidents_graphml/3/378e1880-1a4c-11ee-a525-9fcef38978a9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.173 + 100.64.67.173 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688462514 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 378e1880-1a4c-11ee-a525-9fcef38978a9 + + + diff --git a/graph/incidents_graphml/3/37928550-12f9-11ee-92d4-c14c0b60b700.graphml b/graph/incidents_graphml/3/37928550-12f9-11ee-92d4-c14c0b60b700.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc72bc2d04a2f4d252f40ebd549f54084cc50be6 --- /dev/null +++ b/graph/incidents_graphml/3/37928550-12f9-11ee-92d4-c14c0b60b700.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.140 + 100.64.19.140 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687657208 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37928550-12f9-11ee-92d4-c14c0b60b700 + + + diff --git a/graph/incidents_graphml/3/37938fb0-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37938fb0-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed0a754365513b09d2a53031fed93978cc2b89b6 --- /dev/null +++ b/graph/incidents_graphml/3/37938fb0-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821671 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37938fb0-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/37958a90-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/37958a90-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6082751b25040feaff89e23f65ab86ab49ec0b44 --- /dev/null +++ b/graph/incidents_graphml/3/37958a90-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.172 + 100.64.81.172 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.156 + 100.64.72.156 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1665146425 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37958a90-463d-11ed-9048-e52ef683aaf1 + + + INCIDENT_LINK + 1665146425 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37958a90-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/3/3796b790-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/3796b790-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c00562eb394b963b6b925bd4618ba62c3e9847ba --- /dev/null +++ b/graph/incidents_graphml/3/3796b790-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.215 + 100.64.12.215 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684930763 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3796b790-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/379744f0-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/379744f0-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8cd3b41694434ee2d2261b1bb9a4e7c1c20329d --- /dev/null +++ b/graph/incidents_graphml/3/379744f0-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665105 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 379744f0-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/379a6a90-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/379a6a90-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91c5f88a0eac5ce5f26ee9d123d14e7ab9dba7a5 --- /dev/null +++ b/graph/incidents_graphml/3/379a6a90-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.62 + 100.64.78.62 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660860907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 379a6a90-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37a00d20-5e3f-11ed-95e5-b5536252f217.graphml b/graph/incidents_graphml/3/37a00d20-5e3f-11ed-95e5-b5536252f217.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1df69a6bb4a01e8737671fff4b92693c942c74ea --- /dev/null +++ b/graph/incidents_graphml/3/37a00d20-5e3f-11ed-95e5-b5536252f217.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.173 + 100.64.23.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1667786112 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37a00d20-5e3f-11ed-95e5-b5536252f217 + + + INCIDENT_LINK + 1667786112 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37a00d20-5e3f-11ed-95e5-b5536252f217 + + + diff --git a/graph/incidents_graphml/3/37a1f560-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/37a1f560-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89b86f0ef6bacd438a18a3f3f485794547369629 --- /dev/null +++ b/graph/incidents_graphml/3/37a1f560-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.68.1 + 100.64.68.1 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477055 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37a1f560-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/37a259d0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37a259d0-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5be6071b2c0476f9e26bbe4b5f992ca0b5dd417b --- /dev/null +++ b/graph/incidents_graphml/3/37a259d0-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.62 + 100.64.78.62 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660860907 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37a259d0-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37aa2200-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37aa2200-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80455cf69f7a0420092e59e89be92366bcc4b8e4 --- /dev/null +++ b/graph/incidents_graphml/3/37aa2200-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.209 + USER-0015-1772.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660860907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37aa2200-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37ac6270-fa2d-11ed-af18-a9f44b259145.graphml b/graph/incidents_graphml/3/37ac6270-fa2d-11ed-af18-a9f44b259145.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45d460a102a3bf0977642d723a3d4ac2f482313d --- /dev/null +++ b/graph/incidents_graphml/3/37ac6270-fa2d-11ed-af18-a9f44b259145.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.12.215 + 100.64.12.215 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684930763 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37ac6270-fa2d-11ed-af18-a9f44b259145 + + + diff --git a/graph/incidents_graphml/3/37adaaf0-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37adaaf0-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3909b682ad5e5bb7fa764bb5381ea22ff40d8ce6 --- /dev/null +++ b/graph/incidents_graphml/3/37adaaf0-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.101 + 100.64.34.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.74.95 + 100.64.74.95 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690760752 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37adaaf0-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760752 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37adaaf0-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/37aff500-8ce2-11ee-b145-63bb68632209.graphml b/graph/incidents_graphml/3/37aff500-8ce2-11ee-b145-63bb68632209.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3de94f64e6dbcc90b606cf8f39886e75c70539f --- /dev/null +++ b/graph/incidents_graphml/3/37aff500-8ce2-11ee-b145-63bb68632209.graphml @@ -0,0 +1,401 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.62 + 100.64.59.62 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.63 + USER-0015-1432.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.64 + 100.64.59.64 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.65 + 100.64.59.65 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.57 + USER-0015-1404.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.66 + 100.64.59.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.67 + 100.64.59.67 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.68 + 100.64.59.68 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.72 + 100.64.10.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.36 + 100.64.19.36 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + INCIDENT_LINK + 1701061372 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37aff500-8ce2-11ee-b145-63bb68632209 + + + diff --git a/graph/incidents_graphml/3/37b1e790-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37b1e790-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..06a66681d40be5bf1767a1dddda5af3a5d01c72a --- /dev/null +++ b/graph/incidents_graphml/3/37b1e790-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.12.226 + 100.64.12.226 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690703199 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37b1e790-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/37b4d060-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37b4d060-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4c175ad422e0abfe37fe953079c6b5426619521 --- /dev/null +++ b/graph/incidents_graphml/3/37b4d060-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.209 + USER-0015-1772.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660860907 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37b4d060-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37b8cb50-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37b8cb50-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9703524b4d32d2a7dcf33cd600c78b5efcb7440 --- /dev/null +++ b/graph/incidents_graphml/3/37b8cb50-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.20 + 100.64.93.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-16922 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.221.82.8 + USER-0015-1968.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37b8cb50-9cb3-11ed-8977-e596d5530bb8 + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37b8cb50-9cb3-11ed-8977-e596d5530bb8 + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37b8cb50-9cb3-11ed-8977-e596d5530bb8 + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37b8cb50-9cb3-11ed-8977-e596d5530bb8 + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37b8cb50-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/37b9cfa0-66fc-11ee-869c-79758109a47c.graphml b/graph/incidents_graphml/3/37b9cfa0-66fc-11ee-869c-79758109a47c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45ac197de9144e9fb623ce62743323cdf739d058 --- /dev/null +++ b/graph/incidents_graphml/3/37b9cfa0-66fc-11ee-869c-79758109a47c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.40 + 100.64.78.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696894394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37b9cfa0-66fc-11ee-869c-79758109a47c + + + diff --git a/graph/incidents_graphml/3/37bdfb70-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37bdfb70-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b55d1f66c08785a575d88e58d881a68da850b83 --- /dev/null +++ b/graph/incidents_graphml/3/37bdfb70-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-16922 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.20 + 100.64.93.20 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37bdfb70-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/37bf7940-f737-11ec-a489-7f4b63a312db.graphml b/graph/incidents_graphml/3/37bf7940-f737-11ec-a489-7f4b63a312db.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43c28ce302258331badcac038252f10399fc722c --- /dev/null +++ b/graph/incidents_graphml/3/37bf7940-f737-11ec-a489-7f4b63a312db.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.201 + USER-0015-1625.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656457707 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37bf7940-f737-11ec-a489-7f4b63a312db + + + diff --git a/graph/incidents_graphml/3/37c22580-253c-11ee-87a4-4902f15b2b60.graphml b/graph/incidents_graphml/3/37c22580-253c-11ee-87a4-4902f15b2b60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b69f30249aec91bda0277c771643fc1c403a9b8 --- /dev/null +++ b/graph/incidents_graphml/3/37c22580-253c-11ee-87a4-4902f15b2b60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689665106 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37c22580-253c-11ee-87a4-4902f15b2b60 + + + diff --git a/graph/incidents_graphml/3/37c48a90-9c9d-11ee-b60c-751684393f5d.graphml b/graph/incidents_graphml/3/37c48a90-9c9d-11ee-b60c-751684393f5d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..404dd4a2d99a1ea35e2e6cb6d36ff12a8a4dc49c --- /dev/null +++ b/graph/incidents_graphml/3/37c48a90-9c9d-11ee-b60c-751684393f5d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1702790955 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37c48a90-9c9d-11ee-b60c-751684393f5d + + + INCIDENT_LINK + 1702790955 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37c48a90-9c9d-11ee-b60c-751684393f5d + + + diff --git a/graph/incidents_graphml/3/37c53e10-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/37c53e10-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b0d72a40d679360472a01f06ab3933eb18e7f915 --- /dev/null +++ b/graph/incidents_graphml/3/37c53e10-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.53.13 + 100.64.53.13 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339713 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37c53e10-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/37c96d20-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37c96d20-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f0a5b97c6c77752f6d5076359b953ec88fa15cc9 --- /dev/null +++ b/graph/incidents_graphml/3/37c96d20-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.235 + 100.64.6.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37c96d20-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/37c9b450-4e75-11ee-8a68-d180c8de201c.graphml b/graph/incidents_graphml/3/37c9b450-4e75-11ee-8a68-d180c8de201c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9cec3492f1ad68df4382dc62e48c3b5f0de2a88e --- /dev/null +++ b/graph/incidents_graphml/3/37c9b450-4e75-11ee-8a68-d180c8de201c.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.155 + 100.64.7.155 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694197584 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37c9b450-4e75-11ee-8a68-d180c8de201c + + + INCIDENT_LINK + 1694197584 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37c9b450-4e75-11ee-8a68-d180c8de201c + + + diff --git a/graph/incidents_graphml/3/37c9c4f0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/37c9c4f0-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f65291e2785a7c5d6e46d64937bebc9d188fa1f --- /dev/null +++ b/graph/incidents_graphml/3/37c9c4f0-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.33.117 + 100.64.33.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1706165081 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37c9c4f0-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/37cd16a0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37cd16a0-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb836e78e18908479d31d3663b672d0d6f66c013 --- /dev/null +++ b/graph/incidents_graphml/3/37cd16a0-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.6.235 + 100.64.6.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1674652906 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37cd16a0-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/37cfd5c0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37cfd5c0-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5a48c7fadb3127cf1fb7cadff87522424c5a4a3e --- /dev/null +++ b/graph/incidents_graphml/3/37cfd5c0-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.22 + 100.64.93.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1674652906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37cfd5c0-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/37d1d130-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37d1d130-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..180653b7ecf4e17a250ad8c7591da3e183c5fe9a --- /dev/null +++ b/graph/incidents_graphml/3/37d1d130-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.77 + 100.64.14.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37d1d130-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/37d4ded0-9cb3-11ed-8977-e596d5530bb8.graphml b/graph/incidents_graphml/3/37d4ded0-9cb3-11ed-8977-e596d5530bb8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..269320f4a14e63766fdd1679a4ffd23b23507a5e --- /dev/null +++ b/graph/incidents_graphml/3/37d4ded0-9cb3-11ed-8977-e596d5530bb8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.22 + 100.64.93.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1674652906 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37d4ded0-9cb3-11ed-8977-e596d5530bb8 + + + diff --git a/graph/incidents_graphml/3/37ddf110-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37ddf110-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..444e5b48f34a05ecf14be34d63f0838b0d654708 --- /dev/null +++ b/graph/incidents_graphml/3/37ddf110-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.181 + 100.64.16.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437278 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37ddf110-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/37e134f0-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/37e134f0-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5430f4e7eb0f310a0fc20fa71b054b049e5a230 --- /dev/null +++ b/graph/incidents_graphml/3/37e134f0-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.252.127 + 192.168.252.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.198 + 100.64.73.198 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.199 + 100.64.73.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690703199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e134f0-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e134f0-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e134f0-2ead-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690703199 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e134f0-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/37e178a0-3477-11ee-95f5-05a30bfe2201.graphml b/graph/incidents_graphml/3/37e178a0-3477-11ee-95f5-05a30bfe2201.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f9fa2166be0f152bb0927dc7546b49e18e4b65bf --- /dev/null +++ b/graph/incidents_graphml/3/37e178a0-3477-11ee-95f5-05a30bfe2201.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.13 + 100.64.53.13 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691339714 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37e178a0-3477-11ee-95f5-05a30bfe2201 + + + diff --git a/graph/incidents_graphml/3/37e6a1e0-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/37e6a1e0-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42252cea1c7a74eda842f3f86042aca42d7a3195 --- /dev/null +++ b/graph/incidents_graphml/3/37e6a1e0-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.255 + 100.64.50.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.1 + 100.64.51.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.1 + 100.64.51.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.2 + 100.64.51.2 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.3 + 100.64.51.3 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.4 + 100.64.51.4 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.130 + 100.64.7.130 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.5 + 100.64.51.5 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.6 + 100.64.51.6 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.158 + 100.64.44.158 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.7 + 100.64.51.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.157 + 100.64.17.157 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.150 + 100.64.9.150 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.216 + HOST-4306 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.8 + 100.64.51.8 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.9 + 100.64.51.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.220 + 100.64.36.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.10 + 100.64.51.10 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726468 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e6a1e0-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/3/37e99900-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/37e99900-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38c141aac2dcd9fd33c1b5814295d19d245fcfb7 --- /dev/null +++ b/graph/incidents_graphml/3/37e99900-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.161 + 100.64.52.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261351 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37e99900-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/37e9ea20-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37e9ea20-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e603ebb369d3c413bbb002f035376eb133bf874b --- /dev/null +++ b/graph/incidents_graphml/3/37e9ea20-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.64 + 100.64.78.64 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660860907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e9ea20-1f43-11ed-83f1-1b6fe38c661d + + + INCIDENT_LINK + 1660860907 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37e9ea20-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37eab060-f92f-11ed-8a40-8d257fb4516c.graphml b/graph/incidents_graphml/3/37eab060-f92f-11ed-8a40-8d257fb4516c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3fdf856bbbd799b852e4f0e33e8cdedd5b9ca06 --- /dev/null +++ b/graph/incidents_graphml/3/37eab060-f92f-11ed-8a40-8d257fb4516c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.14.77 + 100.64.14.77 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821671 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 37eab060-f92f-11ed-8a40-8d257fb4516c + + + diff --git a/graph/incidents_graphml/3/37eb1070-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37eb1070-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cc645a0d02e51199cd673c9cda1da5bddefe5fd1 --- /dev/null +++ b/graph/incidents_graphml/3/37eb1070-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.198 + 100.64.54.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437279 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37eb1070-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/37f052c0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37f052c0-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5714daa20fb2b183b01a64173658f87d99baab5f --- /dev/null +++ b/graph/incidents_graphml/3/37f052c0-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.65 + 100.64.78.65 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660860908 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 37f052c0-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7b13788c2123e064788e5dcc144c04b475b0f41b --- /dev/null +++ b/graph/incidents_graphml/3/37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,789 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.139 + 100.64.36.139 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.222 + 100.64.71.222 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.21 + 100.64.81.21 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.81.22 + 100.64.81.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.74.72 + 100.64.74.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.91 + 100.64.76.91 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.75.222 + 100.64.75.222 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + USER-0015-1727.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.86 + 100.64.71.86 + ["Exploiting Host"] + 0.7626953125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","Meraki"] + + + HOST + 100.64.44.61 + 100.64.44.61 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.195 + 100.64.73.195 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.23 + 100.64.81.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + USER-0015-1622.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.13.115 + 100.64.13.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.81.24 + 100.64.81.24 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.18 + 100.64.79.18 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37f6f8b0-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/37f81af0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37f81af0-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ddbf9605f961f72700ab778df4bd84aab78ad6c --- /dev/null +++ b/graph/incidents_graphml/3/37f81af0-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.65 + 100.64.78.65 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1660860908 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37f81af0-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37f9b670-6bec-11ee-af48-5f3b86c59f98.graphml b/graph/incidents_graphml/3/37f9b670-6bec-11ee-af48-5f3b86c59f98.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93915b7f38a695654f744272ba5379d52c9937d5 --- /dev/null +++ b/graph/incidents_graphml/3/37f9b670-6bec-11ee-af48-5f3b86c59f98.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.198 + 100.64.54.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697437279 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37f9b670-6bec-11ee-af48-5f3b86c59f98 + + + diff --git a/graph/incidents_graphml/3/37fcfcf0-1f43-11ed-83f1-1b6fe38c661d.graphml b/graph/incidents_graphml/3/37fcfcf0-1f43-11ed-83f1-1b6fe38c661d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c139239e6fa0db69dea35cd3b3794a958dc12b07 --- /dev/null +++ b/graph/incidents_graphml/3/37fcfcf0-1f43-11ed-83f1-1b6fe38c661d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.78.67 + 100.64.78.67 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660860908 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 37fcfcf0-1f43-11ed-83f1-1b6fe38c661d + + + diff --git a/graph/incidents_graphml/3/37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8deba12c22d0b4ea7d408ee20b386dc20693bfcb --- /dev/null +++ b/graph/incidents_graphml/3/37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.15 + 100.64.31.15 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.13.216 + 100.64.13.216 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.81.25 + 100.64.81.25 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199018 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199018 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 37fdfd90-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/3800b110-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3800b110-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bdefef561973e5b9cc28fcd6f88bb230b7d8cb0 --- /dev/null +++ b/graph/incidents_graphml/3/3800b110-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.66 + 100.64.18.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868459 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3800b110-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/3819aa10-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3819aa10-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..62c7fbb091c99c1dee00e8401da7803b3fc3bc93 --- /dev/null +++ b/graph/incidents_graphml/3/3819aa10-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.201 + 100.64.73.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690703200 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3819aa10-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/382afc70-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/382afc70-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7bd2d03f148e6ea839847ccff64fd58d9cadf77 --- /dev/null +++ b/graph/incidents_graphml/3/382afc70-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.49 + 100.64.8.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.79.185 + 100.64.79.185 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382afc70-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382afc70-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382afc70-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382afc70-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/3/382c5c00-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/382c5c00-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e458c2cd933fc0ae5b15bb8136ff8d0ab9c039e5 --- /dev/null +++ b/graph/incidents_graphml/3/382c5c00-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.65 + 100.64.72.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382c5c00-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382c5c00-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/3/382dbb90-be91-11ed-9416-c54055a72e53.graphml b/graph/incidents_graphml/3/382dbb90-be91-11ed-9416-c54055a72e53.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffe5781d5696b1cd5c11c1e2a05bc82aee30e1b9 --- /dev/null +++ b/graph/incidents_graphml/3/382dbb90-be91-11ed-9416-c54055a72e53.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.99 + 100.64.72.99 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.147 + 100.64.72.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382dbb90-be91-11ed-9416-c54055a72e53 + + + INCIDENT_LINK + 1678376644 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 382dbb90-be91-11ed-9416-c54055a72e53 + + + diff --git a/graph/incidents_graphml/3/38308d70-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/38308d70-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b76b0780b60072d187e0d0723ac76d1593bafb43 --- /dev/null +++ b/graph/incidents_graphml/3/38308d70-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.201 + 100.64.73.201 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690703200 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38308d70-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/3833a270-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/3833a270-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ca5bd750c380eb04d28e7063a11de2e46b4efbef --- /dev/null +++ b/graph/incidents_graphml/3/3833a270-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.176 + 100.64.32.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3833a270-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/383c3da0-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/3/383c3da0-ed63-11ec-9115-b3a5268a4818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d0b5cd847bfa88faa279f7a1575c1350bed82b4 --- /dev/null +++ b/graph/incidents_graphml/3/383c3da0-ed63-11ec-9115-b3a5268a4818.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.4 + 100.64.72.4 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655377094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 383c3da0-ed63-11ec-9115-b3a5268a4818 + + + INCIDENT_LINK + 1655377094 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 383c3da0-ed63-11ec-9115-b3a5268a4818 + + + diff --git a/graph/incidents_graphml/3/38472a70-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/38472a70-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40c32bfa96c10c003c7b764fd9244b6944e5765d --- /dev/null +++ b/graph/incidents_graphml/3/38472a70-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.176 + 100.64.32.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1715966627 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38472a70-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/384a08e0-2ead-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/384a08e0-2ead-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dcb5030b715a021a966a577bbfc8ed76e214119a --- /dev/null +++ b/graph/incidents_graphml/3/384a08e0-2ead-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.202 + 100.64.73.202 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690703200 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 384a08e0-2ead-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/385420b0-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/385420b0-51fc-11ee-8b1c-f9bbd63a1625.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8213fd29072fcaba2ca586d4dff4dea7f2c6db27 --- /dev/null +++ b/graph/incidents_graphml/3/385420b0-51fc-11ee-8b1c-f9bbd63a1625.graphml @@ -0,0 +1,875 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.99 + 100.64.18.99 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.20 + USER-0015-1392.example.internal + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.46 + 100.64.51.46 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.47 + 100.64.51.47 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.48 + 100.64.51.48 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.192 + 100.64.14.192 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.49 + 100.64.51.49 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.249 + 100.64.13.249 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.50 + 100.64.51.50 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.51 + 100.64.51.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.73 + 100.64.19.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.52 + 100.64.51.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.189 + 100.64.19.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + INCIDENT_LINK + 1694585421 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 385420b0-51fc-11ee-8b1c-f9bbd63a1625 + + + diff --git a/graph/incidents_graphml/3/38579000-7412-11ee-91c2-7545920d3cab.graphml b/graph/incidents_graphml/3/38579000-7412-11ee-91c2-7545920d3cab.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91ae22c14b4f946efe0d577633e7eef08180e15c --- /dev/null +++ b/graph/incidents_graphml/3/38579000-7412-11ee-91c2-7545920d3cab.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1698333209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 38579000-7412-11ee-91c2-7545920d3cab + + + diff --git a/graph/incidents_graphml/3/38584d10-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/38584d10-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d4dfc6202b3d879bb6160137b9385b6a58cd8e5 --- /dev/null +++ b/graph/incidents_graphml/3/38584d10-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477056 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38584d10-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/38587830-ed63-11ec-9115-b3a5268a4818.graphml b/graph/incidents_graphml/3/38587830-ed63-11ec-9115-b3a5268a4818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52d6c1a5c4fd86ab72a4e6e7c7937b4fb75dc59f --- /dev/null +++ b/graph/incidents_graphml/3/38587830-ed63-11ec-9115-b3a5268a4818.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki"] + + + HOST + 100.64.75.112 + USER-0015-1760.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655377094 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38587830-ed63-11ec-9115-b3a5268a4818 + + + diff --git a/graph/incidents_graphml/3/385a8b60-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/385a8b60-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6ad87333231afae1fecfeeb00a365e3cad799cfd --- /dev/null +++ b/graph/incidents_graphml/3/385a8b60-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.168 + 100.64.51.168 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.181 + 100.64.31.181 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.223 + 100.64.63.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.224 + 100.64.63.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.225 + 100.64.63.225 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.226 + 100.64.63.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.227 + 100.64.63.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + INCIDENT_LINK + 1715966627 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 385a8b60-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/386013e0-0948-11ee-899e-3d5be197ab3b.graphml b/graph/incidents_graphml/3/386013e0-0948-11ee-899e-3d5be197ab3b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac7021612e96163d71397a575676fb91cf0b7443 --- /dev/null +++ b/graph/incidents_graphml/3/386013e0-0948-11ee-899e-3d5be197ab3b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.149 + 100.64.79.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + 100.64.71.179 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686591628 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 386013e0-0948-11ee-899e-3d5be197ab3b + + + INCIDENT_LINK + 1686591628 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 386013e0-0948-11ee-899e-3d5be197ab3b + + + diff --git a/graph/incidents_graphml/3/3863cb60-6092-11ee-a31b-270f2d0ccd3d.graphml b/graph/incidents_graphml/3/3863cb60-6092-11ee-a31b-270f2d0ccd3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc2626bf6d68823fa1c5fde220269b1ce465af48 --- /dev/null +++ b/graph/incidents_graphml/3/3863cb60-6092-11ee-a31b-270f2d0ccd3d.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.24 + 100.64.69.24 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.69.25 + 100.64.69.25 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696189162 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3863cb60-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189162 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3863cb60-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189162 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3863cb60-6092-11ee-a31b-270f2d0ccd3d + + + INCIDENT_LINK + 1696189162 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3863cb60-6092-11ee-a31b-270f2d0ccd3d + + + diff --git a/graph/incidents_graphml/3/38647460-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/38647460-51fc-11ee-8b1c-f9bbd63a1625.graphml new file mode 100644 index 0000000000000000000000000000000000000000..57487e1a449d35de99643d2b58ab935160f3eec7 --- /dev/null +++ b/graph/incidents_graphml/3/38647460-51fc-11ee-8b1c-f9bbd63a1625.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694585421 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38647460-51fc-11ee-8b1c-f9bbd63a1625 + + + diff --git a/graph/incidents_graphml/3/38664cd0-3fab-11ee-80ec-e74e3a459676.graphml b/graph/incidents_graphml/3/38664cd0-3fab-11ee-80ec-e74e3a459676.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ec1f0ecce3c4bf25e9c0c64444f37c988c5a048 --- /dev/null +++ b/graph/incidents_graphml/3/38664cd0-3fab-11ee-80ec-e74e3a459676.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.138 + 100.64.64.138 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.34 + 100.64.43.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.77 + 100.64.4.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.122 + 100.64.15.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.33 + 100.64.12.33 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + INCIDENT_LINK + 1692571511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38664cd0-3fab-11ee-80ec-e74e3a459676 + + + diff --git a/graph/incidents_graphml/3/38680480-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/38680480-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71e756199d354888f4cf56a71296a243cd2bdc1c --- /dev/null +++ b/graph/incidents_graphml/3/38680480-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.50 + 100.64.24.50 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477056 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38680480-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/386b2d30-1472-11ef-94ab-9b572b609cc3.graphml b/graph/incidents_graphml/3/386b2d30-1472-11ef-94ab-9b572b609cc3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a87f8897814ba729b9d57bb10c4dff12f877d16 --- /dev/null +++ b/graph/incidents_graphml/3/386b2d30-1472-11ef-94ab-9b572b609cc3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.89 + 100.64.13.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1715966627 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 386b2d30-1472-11ef-94ab-9b572b609cc3 + + + diff --git a/graph/incidents_graphml/3/387597a0-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/387597a0-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94e0d1b8ea60f0b8a2fe8dd8fb77e1a43057986a --- /dev/null +++ b/graph/incidents_graphml/3/387597a0-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.153 + 100.64.3.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802615 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 387597a0-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3877fc60-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/3877fc60-51fc-11ee-8b1c-f9bbd63a1625.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c951a19519223440f6b94bb7ff0569ee98bfd60 --- /dev/null +++ b/graph/incidents_graphml/3/3877fc60-51fc-11ee-8b1c-f9bbd63a1625.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.221 + 100.64.24.221 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694585421 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3877fc60-51fc-11ee-8b1c-f9bbd63a1625 + + + diff --git a/graph/incidents_graphml/3/38786ef0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38786ef0-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e80d32c17b46f83a74eda7c77d94d70020ed5c0b --- /dev/null +++ b/graph/incidents_graphml/3/38786ef0-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.176 + 100.64.17.176 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38786ef0-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/387bd560-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/387bd560-27a9-11ee-82e1-59dd32b62381.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79be72f5af674253fe8a34ad36ca2e7cc5b36ce4 --- /dev/null +++ b/graph/incidents_graphml/3/387bd560-27a9-11ee-82e1-59dd32b62381.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.175 + USER-0015-1417.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689931824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 387bd560-27a9-11ee-82e1-59dd32b62381 + + + diff --git a/graph/incidents_graphml/3/38883a20-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/3/38883a20-98f7-11ee-8096-1db1b3bdcb7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1ffe69afa745a24dc1e8528f52a9d85b0ae9988 --- /dev/null +++ b/graph/incidents_graphml/3/38883a20-98f7-11ee-8096-1db1b3bdcb7c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.103 + 100.64.18.103 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.20 + 100.64.68.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702389806 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38883a20-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389806 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38883a20-98f7-11ee-8096-1db1b3bdcb7c + + + diff --git a/graph/incidents_graphml/3/38912710-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38912710-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a7e9fca993540ade05eaa7b05e0cc928e2c7d7a0 --- /dev/null +++ b/graph/incidents_graphml/3/38912710-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.36 + 100.64.18.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38912710-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/389b9260-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/389b9260-27a9-11ee-82e1-59dd32b62381.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0647630dfcd4f971d05a18823caeb2b7a0419f40 --- /dev/null +++ b/graph/incidents_graphml/3/389b9260-27a9-11ee-82e1-59dd32b62381.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.175 + USER-0015-1417.example.internal + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689931824 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 389b9260-27a9-11ee-82e1-59dd32b62381 + + + diff --git a/graph/incidents_graphml/3/389e6f80-4404-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/3/389e6f80-4404-11ef-b0b5-17c176975c0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..efbacfd937a096e515c988659e8ffa411c915838 --- /dev/null +++ b/graph/incidents_graphml/3/389e6f80-4404-11ef-b0b5-17c176975c0f.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.141 + 100.64.50.141 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.73 + 100.64.28.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.142 + 100.64.50.142 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.18 + 100.64.19.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.178 + 100.64.35.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.143 + 100.64.50.143 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.144 + 100.64.50.144 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.136 + 100.64.20.136 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.145 + 100.64.50.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.146 + 100.64.50.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.147 + 100.64.50.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 389e6f80-4404-11ef-b0b5-17c176975c0f + + + diff --git a/graph/incidents_graphml/3/389f09c0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/389f09c0-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77ffd4270aa3bbd3c9c9410148d73b0320db0bb5 --- /dev/null +++ b/graph/incidents_graphml/3/389f09c0-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.36 + 100.64.18.36 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 389f09c0-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/38ab6670-fc46-11ec-b1da-11e6c916d75e.graphml b/graph/incidents_graphml/3/38ab6670-fc46-11ec-b1da-11e6c916d75e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f18ee0cc4baa769912efd86a565a1fde6ee9814b --- /dev/null +++ b/graph/incidents_graphml/3/38ab6670-fc46-11ec-b1da-11e6c916d75e.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.172 + 100.64.72.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.76.202 + 100.64.76.202 + ["Exploiting Target","Exploiting Host"] + 0.88134765625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.79.158 + USER-0015-1819.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.40 + USER-0015-1837.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + INCIDENT_LINK + 1657013907 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38ab6670-fc46-11ec-b1da-11e6c916d75e + + + diff --git a/graph/incidents_graphml/3/38b1bc80-3c70-11ee-89e7-7976671c0f18.graphml b/graph/incidents_graphml/3/38b1bc80-3c70-11ee-89e7-7976671c0f18.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edcaf0204523c31129b278cefcc14f51677bd9fe --- /dev/null +++ b/graph/incidents_graphml/3/38b1bc80-3c70-11ee-89e7-7976671c0f18.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.58 + 100.64.59.58 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1692216318 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b1bc80-3c70-11ee-89e7-7976671c0f18 + + + INCIDENT_LINK + 1692216318 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b1bc80-3c70-11ee-89e7-7976671c0f18 + + + diff --git a/graph/incidents_graphml/3/38b8d550-4404-11ef-b0b5-17c176975c0f.graphml b/graph/incidents_graphml/3/38b8d550-4404-11ef-b0b5-17c176975c0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac0e8556e63280e0eab7fe87914ea82b164015b9 --- /dev/null +++ b/graph/incidents_graphml/3/38b8d550-4404-11ef-b0b5-17c176975c0f.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.159 + 100.64.50.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.160 + 100.64.50.160 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721197039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b8d550-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b8d550-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b8d550-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b8d550-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b8d550-4404-11ef-b0b5-17c176975c0f + + + INCIDENT_LINK + 1721197039 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38b8d550-4404-11ef-b0b5-17c176975c0f + + + diff --git a/graph/incidents_graphml/3/38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625.graphml b/graph/incidents_graphml/3/38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d6774102c48be8d80c2b995373c4d0717d5b630 --- /dev/null +++ b/graph/incidents_graphml/3/38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.146 + 100.64.35.146 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694585422 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38c9ecf0-51fc-11ee-8b1c-f9bbd63a1625 + + + diff --git a/graph/incidents_graphml/3/38d3e070-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/38d3e070-27a9-11ee-82e1-59dd32b62381.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1f648f91dc36e1f59731e7d4bee4dd11efba307 --- /dev/null +++ b/graph/incidents_graphml/3/38d3e070-27a9-11ee-82e1-59dd32b62381.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.195 + 100.64.27.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689931825 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38d3e070-27a9-11ee-82e1-59dd32b62381 + + + diff --git a/graph/incidents_graphml/3/38dc4d90-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/3/38dc4d90-98f7-11ee-8096-1db1b3bdcb7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f71ded08a4cb7ad99fdc42254d634f07364fce1 --- /dev/null +++ b/graph/incidents_graphml/3/38dc4d90-98f7-11ee-8096-1db1b3bdcb7c.graphml @@ -0,0 +1,133 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect","Windows Active Directory"] + + + HOST + 100.64.69.216 + 100.64.69.216 + ["Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.69.217 + 100.64.69.217 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1702389807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389807 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Unprocessed + 38dc4d90-98f7-11ee-8096-1db1b3bdcb7c + + + diff --git a/graph/incidents_graphml/3/38dc6fe0-2d7c-11ef-88d9-1fb9581a602f.graphml b/graph/incidents_graphml/3/38dc6fe0-2d7c-11ef-88d9-1fb9581a602f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fb72a27b8d09f5bf886e935bface810ce961fa6 --- /dev/null +++ b/graph/incidents_graphml/3/38dc6fe0-2d7c-11ef-88d9-1fb9581a602f.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.209.161 + 172.25.209.161 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.202 + 100.64.93.202 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.203 + 100.64.93.203 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.88.133 + 100.64.88.133 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.93.204 + 100.64.93.204 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.140 + 100.64.91.140 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + INCIDENT_LINK + 1718719702 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dc6fe0-2d7c-11ef-88d9-1fb9581a602f + + + diff --git a/graph/incidents_graphml/3/38dcb960-a2d4-11ee-9cfc-094b81d7b53b.graphml b/graph/incidents_graphml/3/38dcb960-a2d4-11ee-9cfc-094b81d7b53b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..258ed0e11c10cedec2f50826765d2e7e81ffc651 --- /dev/null +++ b/graph/incidents_graphml/3/38dcb960-a2d4-11ee-9cfc-094b81d7b53b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.114 + 100.64.94.114 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.86.76 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1703474286 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38dcb960-a2d4-11ee-9cfc-094b81d7b53b + + + diff --git a/graph/incidents_graphml/3/38e444f0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/38e444f0-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..423acb93302409bbb64d905ba6f3ef6e9d66db62 --- /dev/null +++ b/graph/incidents_graphml/3/38e444f0-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.159 + 100.64.20.159 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130585 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38e444f0-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/3/38e45020-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38e45020-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbb5169ab1875656028934d3ed641be819f401ef --- /dev/null +++ b/graph/incidents_graphml/3/38e45020-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38e45020-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/38e886b0-0c1a-11ee-a535-110da53c9d07.graphml b/graph/incidents_graphml/3/38e886b0-0c1a-11ee-a535-110da53c9d07.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d78f5d1d55ae6950e68ed94de56fd6656d06ebc --- /dev/null +++ b/graph/incidents_graphml/3/38e886b0-0c1a-11ee-a535-110da53c9d07.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.229 + 100.64.80.229 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686901725 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38e886b0-0c1a-11ee-a535-110da53c9d07 + + + INCIDENT_LINK + 1686901725 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38e886b0-0c1a-11ee-a535-110da53c9d07 + + + diff --git a/graph/incidents_graphml/3/38ee47c0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/38ee47c0-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ec0c7bd51cac56b8b87aa91b80a4dc16f1849dd --- /dev/null +++ b/graph/incidents_graphml/3/38ee47c0-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.124 + 100.64.94.124 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1706165083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 38ee47c0-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/38ee4bb0-ace6-11ed-9c58-3fd78e20bcce.graphml b/graph/incidents_graphml/3/38ee4bb0-ace6-11ed-9c58-3fd78e20bcce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2c772b62513dc5a2dea482e51ab6a27cdfe73c9 --- /dev/null +++ b/graph/incidents_graphml/3/38ee4bb0-ace6-11ed-9c58-3fd78e20bcce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.36.138 + 100.64.36.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676434031 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 38ee4bb0-ace6-11ed-9c58-3fd78e20bcce + + + diff --git a/graph/incidents_graphml/3/38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b9f88f51c118c2d5c7612948c985deb524d1708 --- /dev/null +++ b/graph/incidents_graphml/3/38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.252 + 100.64.9.252 + ["Exploiting Host","Exploiting Target"] + 0.9746875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194781 + malicious + 0.9746875 + 0.9746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38f1e4b0-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/38fbb540-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/38fbb540-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..789f522737fdfefaddcd748dbeefd99b7254c6fb --- /dev/null +++ b/graph/incidents_graphml/3/38fbb540-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.94.124 + 100.64.94.124 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706165083 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 38fbb540-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/38fdf1f0-02ef-11ee-800b-d36f3c94df97.graphml b/graph/incidents_graphml/3/38fdf1f0-02ef-11ee-800b-d36f3c94df97.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bb869d1766af7c482578bb2d6ddaacba47edba75 --- /dev/null +++ b/graph/incidents_graphml/3/38fdf1f0-02ef-11ee-800b-d36f3c94df97.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.156 + 100.64.76.156 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.1.40 + HOST-13966 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.38.176 + 100.64.38.176 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.53.227 + 100.64.53.227 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1685893697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38fdf1f0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38fdf1f0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38fdf1f0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38fdf1f0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38fdf1f0-02ef-11ee-800b-d36f3c94df97 + + + INCIDENT_LINK + 1685893697 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 38fdf1f0-02ef-11ee-800b-d36f3c94df97 + + + diff --git a/graph/incidents_graphml/3/3919c850-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/3919c850-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3102fe19fe22efdc7c71e3878d5861f80d985fd3 --- /dev/null +++ b/graph/incidents_graphml/3/3919c850-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.3 + 100.64.68.3 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477057 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3919c850-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/392a6a40-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/392a6a40-70fa-11ee-8198-9db2a0bce259.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8805232f14c42df17d3c5ddd9e09f1ae41a01705 --- /dev/null +++ b/graph/incidents_graphml/3/392a6a40-70fa-11ee-8198-9db2a0bce259.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.79 + 100.64.48.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697993049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 392a6a40-70fa-11ee-8198-9db2a0bce259 + + + INCIDENT_LINK + 1697993049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 392a6a40-70fa-11ee-8198-9db2a0bce259 + + + INCIDENT_LINK + 1697993049 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 392a6a40-70fa-11ee-8198-9db2a0bce259 + + + diff --git a/graph/incidents_graphml/3/392b9c80-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/392b9c80-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68cdcbef832028aadc613bd183989b273d5ed688 --- /dev/null +++ b/graph/incidents_graphml/3/392b9c80-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868461 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 392b9c80-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/392c17d0-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/392c17d0-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e5fb07474962ce61d147f1700c3765adcd458243 --- /dev/null +++ b/graph/incidents_graphml/3/392c17d0-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.5 + 100.64.68.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477058 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 392c17d0-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/3939d390-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/3939d390-70fa-11ee-8198-9db2a0bce259.graphml new file mode 100644 index 0000000000000000000000000000000000000000..470bbb169e756f68a5c63f33bff83ba7e453e1a3 --- /dev/null +++ b/graph/incidents_graphml/3/3939d390-70fa-11ee-8198-9db2a0bce259.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.160 + 100.64.43.160 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697993050 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3939d390-70fa-11ee-8198-9db2a0bce259 + + + diff --git a/graph/incidents_graphml/3/393bc920-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/393bc920-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..29d5b2fcb1c7f588d3862d40d2411e51c01aa404 --- /dev/null +++ b/graph/incidents_graphml/3/393bc920-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868461 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 393bc920-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/393dcb10-5a18-11ee-8c81-27ac3690fef9.graphml b/graph/incidents_graphml/3/393dcb10-5a18-11ee-8c81-27ac3690fef9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d713050991b9ecbab1ff9e6cbf2c0c41ca1e0a0 --- /dev/null +++ b/graph/incidents_graphml/3/393dcb10-5a18-11ee-8c81-27ac3690fef9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.68.5 + 100.64.68.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695477058 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 393dcb10-5a18-11ee-8c81-27ac3690fef9 + + + diff --git a/graph/incidents_graphml/3/394b8540-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/394b8540-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8848038bb22c8626f4e0d670db7d441006f6c341 --- /dev/null +++ b/graph/incidents_graphml/3/394b8540-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.87 + 100.64.13.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802616 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 394b8540-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/39521680-70fa-11ee-8198-9db2a0bce259.graphml b/graph/incidents_graphml/3/39521680-70fa-11ee-8198-9db2a0bce259.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b3a70cd2cfd8482da824cba82b00f0af230e969 --- /dev/null +++ b/graph/incidents_graphml/3/39521680-70fa-11ee-8198-9db2a0bce259.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.160 + 100.64.43.160 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697993050 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 39521680-70fa-11ee-8198-9db2a0bce259 + + + diff --git a/graph/incidents_graphml/3/39559390-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/39559390-27a9-11ee-82e1-59dd32b62381.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2ec4df8ccb42bc8169c7786b03d23c4bbba2279 --- /dev/null +++ b/graph/incidents_graphml/3/39559390-27a9-11ee-82e1-59dd32b62381.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.137 + 100.64.24.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689931826 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 39559390-27a9-11ee-82e1-59dd32b62381 + + + diff --git a/graph/incidents_graphml/3/3956c430-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/3956c430-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d7f00e9f87a7fc35997aa06eacb16f0fadfdc51 --- /dev/null +++ b/graph/incidents_graphml/3/3956c430-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.245 + 100.64.93.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662420842 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3956c430-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/395c4e20-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/395c4e20-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1f2507915d9d6131d3884454aa5acdbde72f500 --- /dev/null +++ b/graph/incidents_graphml/3/395c4e20-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.87 + 100.64.13.87 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802616 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 395c4e20-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3960fd60-2d73-11ed-b556-77f007f35c82.graphml b/graph/incidents_graphml/3/3960fd60-2d73-11ed-b556-77f007f35c82.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a485fb6e06d1b5c85d51f38e2fee914003d6872b --- /dev/null +++ b/graph/incidents_graphml/3/3960fd60-2d73-11ed-b556-77f007f35c82.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.93.245 + 100.64.93.245 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662420842 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3960fd60-2d73-11ed-b556-77f007f35c82 + + + diff --git a/graph/incidents_graphml/3/3983bf00-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3983bf00-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5e729b73725172aae3bf995e88cb396ee869d25 --- /dev/null +++ b/graph/incidents_graphml/3/3983bf00-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.144 + 100.64.14.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3983bf00-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/39914dd0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/39914dd0-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ffbf4f6e162a2742ddd019eb9b4ee77fa5dba14b --- /dev/null +++ b/graph/incidents_graphml/3/39914dd0-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.161 + 100.64.20.161 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130586 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 39914dd0-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/3/399460d0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/399460d0-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbb0eb2320e76b285a6e65195ddac126171cbb6d --- /dev/null +++ b/graph/incidents_graphml/3/399460d0-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.144 + 100.64.14.144 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766317 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 399460d0-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/39998ae0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/39998ae0-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bf0679ebf01f4265c355129ad07faa9e0b19f75 --- /dev/null +++ b/graph/incidents_graphml/3/39998ae0-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.85 + 100.64.7.85 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061832 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 39998ae0-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/399ee260-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/399ee260-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18bdee087992ce1092a45f8493406658431e4b90 --- /dev/null +++ b/graph/incidents_graphml/3/399ee260-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.161 + 100.64.20.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130586 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 399ee260-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/3/39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..317bc2f8a5ea4b82e46df61f8e986c5ecffc9d92 --- /dev/null +++ b/graph/incidents_graphml/3/39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.52 + 100.64.80.52 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.75.181 + 100.64.75.181 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324379 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324379 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39acf5d0-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/3/39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a.graphml b/graph/incidents_graphml/3/39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27530f066ddcb4685832609cfbd4ad53c4c398bf --- /dev/null +++ b/graph/incidents_graphml/3/39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.17.170 + 100.64.17.170 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.71.141 + 100.64.71.141 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1677324379 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a + + + INCIDENT_LINK + 1677324379 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39ae7c70-b4ff-11ed-bb53-cb33bcdbc12a + + + diff --git a/graph/incidents_graphml/3/39ccec20-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/39ccec20-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41b094b4c4801d50fc7b84ad90603bc3f4005a86 --- /dev/null +++ b/graph/incidents_graphml/3/39ccec20-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.94 + 100.64.16.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961531 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 39ccec20-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/39d215b0-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/39d215b0-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..807652e27daa2cf806de9003cd5bbfb40081f6dc --- /dev/null +++ b/graph/incidents_graphml/3/39d215b0-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.41 + 100.64.18.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868462 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 39d215b0-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/39d7b300-0938-11ee-a886-17db84346526.graphml b/graph/incidents_graphml/3/39d7b300-0938-11ee-a886-17db84346526.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff2d42bc1338b42ecab3c69aea1f952feb246df2 --- /dev/null +++ b/graph/incidents_graphml/3/39d7b300-0938-11ee-a886-17db84346526.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.204 + 100.64.20.204 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.88 + 100.64.57.88 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.21 + 100.64.39.21 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686584758 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39d7b300-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584758 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39d7b300-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584758 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39d7b300-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584758 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39d7b300-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584758 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39d7b300-0938-11ee-a886-17db84346526 + + + INCIDENT_LINK + 1686584758 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 39d7b300-0938-11ee-a886-17db84346526 + + + diff --git a/graph/incidents_graphml/3/39dca390-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/39dca390-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2911a24c7ad3616a2eaf9969806a25be0ab5e9b --- /dev/null +++ b/graph/incidents_graphml/3/39dca390-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.94 + 100.64.16.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961531 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 39dca390-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/39e3a1e0-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/39e3a1e0-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ee630ff3ea76f024ba2f9d476e64f9ffc82edfd --- /dev/null +++ b/graph/incidents_graphml/3/39e3a1e0-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.41 + 100.64.18.41 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 39e3a1e0-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/39e7aa40-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/39e7aa40-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e31c8849a0a34875ce71a0af4030993e8f8c3187 --- /dev/null +++ b/graph/incidents_graphml/3/39e7aa40-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440517 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 39e7aa40-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/39ef94f0-2574-11ed-b617-15360be2351c.graphml b/graph/incidents_graphml/3/39ef94f0-2574-11ed-b617-15360be2351c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ffafe5f713ecdc3da6a07aeb0c14d6f351b9fb8 --- /dev/null +++ b/graph/incidents_graphml/3/39ef94f0-2574-11ed-b617-15360be2351c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.204 + 100.64.71.204 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661541663 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 39ef94f0-2574-11ed-b617-15360be2351c + + + diff --git a/graph/incidents_graphml/3/39fb0b30-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/39fb0b30-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddb4103b4a8e039527a14a6d2066e7f1b9bc6063 --- /dev/null +++ b/graph/incidents_graphml/3/39fb0b30-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.105 + 100.64.60.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440517 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 39fb0b30-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3a001af0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3a001af0-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..068af6fc4afc56f894622921fbd3d84899726c6c --- /dev/null +++ b/graph/incidents_graphml/3/3a001af0-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.148 + 100.64.14.148 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766318 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a001af0-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3a0587d0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3a0587d0-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0c08b8d0a88835a77e792ca822abf0a43078a14 --- /dev/null +++ b/graph/incidents_graphml/3/3a0587d0-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.6 + 100.64.12.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856208 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3a0587d0-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3a0b10c0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3a0b10c0-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbde1fa506db9206e5172f158012c08fca6c54e1 --- /dev/null +++ b/graph/incidents_graphml/3/3a0b10c0-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.105 + 100.64.60.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440517 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a0b10c0-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3a0e8ae0-589f-11ee-a130-b3fc4de2b604.graphml b/graph/incidents_graphml/3/3a0e8ae0-589f-11ee-a130-b3fc4de2b604.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d772cc8e0db541f2c7fa9b9dc65e539083415d85 --- /dev/null +++ b/graph/incidents_graphml/3/3a0e8ae0-589f-11ee-a130-b3fc4de2b604.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.155.16 + 172.21.155.16 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Windows Active Directory","Apache Web Server","Barracuda WAF"] + + + HOST + 100.64.91.112 + 100.64.91.112 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.91.113 + 100.64.91.113 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695315139 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3a0e8ae0-589f-11ee-a130-b3fc4de2b604 + + + INCIDENT_LINK + 1695315139 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3a0e8ae0-589f-11ee-a130-b3fc4de2b604 + + + INCIDENT_LINK + 1695315139 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3a0e8ae0-589f-11ee-a130-b3fc4de2b604 + + + INCIDENT_LINK + 1695315139 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3a0e8ae0-589f-11ee-a130-b3fc4de2b604 + + + diff --git a/graph/incidents_graphml/3/3a1c7c90-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3a1c7c90-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae44452fa491714af269107744aa6e3d2e53fb0a --- /dev/null +++ b/graph/incidents_graphml/3/3a1c7c90-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.149 + 100.64.14.149 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766318 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a1c7c90-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3a1e3ff0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3a1e3ff0-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b41ff28688a15e39a906c3000b32755cc121b3b8 --- /dev/null +++ b/graph/incidents_graphml/3/3a1e3ff0-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.6 + 100.64.12.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856208 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a1e3ff0-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6684143b98440d0eb88c815f18289729800fe66a --- /dev/null +++ b/graph/incidents_graphml/3/3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.89 + 100.64.13.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802618 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a1eb3c0-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3a310820-98f7-11ee-8096-1db1b3bdcb7c.graphml b/graph/incidents_graphml/3/3a310820-98f7-11ee-8096-1db1b3bdcb7c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..023f4adfd614d98cd2234a1cceecec94ab19a3bb --- /dev/null +++ b/graph/incidents_graphml/3/3a310820-98f7-11ee-8096-1db1b3bdcb7c.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1702389809 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a310820-98f7-11ee-8096-1db1b3bdcb7c + + + INCIDENT_LINK + 1702389809 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a310820-98f7-11ee-8096-1db1b3bdcb7c + + + diff --git a/graph/incidents_graphml/3/3a318480-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3a318480-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2216ab3ae7ef58a6633654c1bc2b521bfcf239c6 --- /dev/null +++ b/graph/incidents_graphml/3/3a318480-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.71 + 100.64.51.71 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440517 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a318480-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3a35b560-2f33-11ee-873f-bf8b02b45a54.graphml b/graph/incidents_graphml/3/3a35b560-2f33-11ee-873f-bf8b02b45a54.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ab516daf1261efaf07433a9b9e6cd779a5deaba8 --- /dev/null +++ b/graph/incidents_graphml/3/3a35b560-2f33-11ee-873f-bf8b02b45a54.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.40 + 100.64.38.40 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.128 + 100.64.71.128 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.31.248 + 100.64.31.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.48 + 100.64.82.48 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.82.49 + 100.64.82.49 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + INCIDENT_LINK + 1690760756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a35b560-2f33-11ee-873f-bf8b02b45a54 + + + diff --git a/graph/incidents_graphml/3/3a377ea0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3a377ea0-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..85434ac0aa8400e010a27a55582aa7dd52c30ef0 --- /dev/null +++ b/graph/incidents_graphml/3/3a377ea0-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.152 + 100.64.14.152 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766319 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a377ea0-006f-11ef-9e1d-8b16c75f4754 + + + INCIDENT_LINK + 1713766319 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a377ea0-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b688d5840becfc0f64f7d01ecffe3458b570f17 --- /dev/null +++ b/graph/incidents_graphml/3/3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.251 + 100.64.93.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1704115098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a44e5f0-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98b6615076da8ec109d36c2b0f4341bae4926550 --- /dev/null +++ b/graph/incidents_graphml/3/3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","SentinelOne","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.93.251 + 100.64.93.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704115098 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a55aed0-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3a56ef80-7c83-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3a56ef80-7c83-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95138d6ba295a5ce2f2f4be2128fecc3655e8871 --- /dev/null +++ b/graph/incidents_graphml/3/3a56ef80-7c83-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.163 + 100.64.52.163 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699261355 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a56ef80-7c83-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/3a5b39b0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a5b39b0-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a6db43122393d32f227c5f4a135ebcaa27d0326 --- /dev/null +++ b/graph/incidents_graphml/3/3a5b39b0-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.95.226 + 100.64.95.226 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659730047 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a5b39b0-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27705585936973f33b3f4e96602c61d10d094292 --- /dev/null +++ b/graph/incidents_graphml/3/3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.38 + 100.64.18.38 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3a5ff3a0-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/3a61f070-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a61f070-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ec1da4fd2c3709fac13061cb18437071b3ab08c --- /dev/null +++ b/graph/incidents_graphml/3/3a61f070-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.121 + 100.64.92.121 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659730047 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a61f070-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3a6d3b10-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a6d3b10-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50f1093692a890cd4d2c2c65c377c24beadc0db2 --- /dev/null +++ b/graph/incidents_graphml/3/3a6d3b10-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.121 + 100.64.92.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659730047 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a6d3b10-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8ebef90c043171668bf8073e224a3f0e41f0c47 --- /dev/null +++ b/graph/incidents_graphml/3/3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.38 + 100.64.18.38 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194783 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a6ee7c0-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/3a769810-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3a769810-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..864be90f34aae729a6b717144178ccdbfd46e9b8 --- /dev/null +++ b/graph/incidents_graphml/3/3a769810-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.179 + 100.64.15.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597083 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a769810-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3a772620-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a772620-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56f0cda057b5943d23c66b17c6be7e8c650273d8 --- /dev/null +++ b/graph/incidents_graphml/3/3a772620-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659730047 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a772620-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3a7867d0-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3a7867d0-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d5ed2592bd3d2f520e06dfb389283bd783857fd --- /dev/null +++ b/graph/incidents_graphml/3/3a7867d0-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.180 + 100.64.8.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868463 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3a7867d0-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/3a8975a0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3a8975a0-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc1ee8e7ff56b08bcdc41b28b880d4dca4d65fe6 --- /dev/null +++ b/graph/incidents_graphml/3/3a8975a0-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659730047 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a8975a0-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3a8baa30-94e4-11ee-b216-b792b1d50feb.graphml b/graph/incidents_graphml/3/3a8baa30-94e4-11ee-b216-b792b1d50feb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d23bcbd53560b65a408a67ec6749f73801381bd7 --- /dev/null +++ b/graph/incidents_graphml/3/3a8baa30-94e4-11ee-b216-b792b1d50feb.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.177 + 100.64.8.177 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.99 + 100.64.26.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.100 + 100.64.26.100 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.114 + 100.64.8.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.149 + 100.64.8.149 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.101 + 100.64.26.101 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.221 + 100.64.13.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.102 + 100.64.26.102 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.103 + 100.64.26.103 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.144 + 100.64.20.144 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.80 + 100.64.18.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.104 + USER-0015-1261.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.105 + 100.64.26.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.106 + 100.64.26.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.107 + 100.64.26.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.108 + 100.64.26.108 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.109 + 100.64.26.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + INCIDENT_LINK + 1701941845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3a8baa30-94e4-11ee-b216-b792b1d50feb + + + diff --git a/graph/incidents_graphml/3/3a925d70-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3a925d70-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..48ade38f28819644a5e3d1a4103adf4cfd5e41dd --- /dev/null +++ b/graph/incidents_graphml/3/3a925d70-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.179 + 100.64.15.179 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597084 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3a925d70-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3ab3d3e0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ab3d3e0-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5268021641ce5cb36c59ddbb2a7b9853ef72cf1d --- /dev/null +++ b/graph/incidents_graphml/3/3ab3d3e0-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.59.107 + 100.64.59.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440518 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ab3d3e0-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3ab825c0-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3ab825c0-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96d14f80655295d3272e594c8ebc0cfaaed59b1e --- /dev/null +++ b/graph/incidents_graphml/3/3ab825c0-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.48 + 100.64.9.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194784 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab825c0-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/3ab9f200-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/3ab9f200-11b9-11ed-a4c1-252f95debd7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adc6cb340445d10b52b22ff3d63efbcd136f8373 --- /dev/null +++ b/graph/incidents_graphml/3/3ab9f200-11b9-11ed-a4c1-252f95debd7b.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.248 + 100.64.80.248 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.7.228 + 100.64.7.228 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + HOST + 100.64.80.249 + 100.64.80.249 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.80 + 100.64.77.80 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.40 + 100.64.71.40 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ab9f200-11b9-11ed-a4c1-252f95debd7b + + + diff --git a/graph/incidents_graphml/3/3abbc6c0-11b9-11ed-a4c1-252f95debd7b.graphml b/graph/incidents_graphml/3/3abbc6c0-11b9-11ed-a4c1-252f95debd7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..608ad6a285eb9f80c058268926b4d5b6a6b3702e --- /dev/null +++ b/graph/incidents_graphml/3/3abbc6c0-11b9-11ed-a4c1-252f95debd7b.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.250 + 100.64.80.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.251 + 100.64.80.251 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.90 + 100.64.71.90 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.252 + 100.64.80.252 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.253 + 100.64.80.253 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + INCIDENT_LINK + 1659372277 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3abbc6c0-11b9-11ed-a4c1-252f95debd7b + + + diff --git a/graph/incidents_graphml/3/3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea2b297557e7fdfd4ec41e5a86b96563b8f57819 --- /dev/null +++ b/graph/incidents_graphml/3/3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.253 + 100.64.93.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1704115098 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ac2ef90-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3ac5ae30-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ac5ae30-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9ed8c22f6b8f29f11ba2df0379fdc44c5328b02 --- /dev/null +++ b/graph/incidents_graphml/3/3ac5ae30-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.59.107 + 100.64.59.107 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440518 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ac5ae30-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3ac8c790-7be8-11ee-b619-8bfdf25c0d9a.graphml b/graph/incidents_graphml/3/3ac8c790-7be8-11ee-b619-8bfdf25c0d9a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16c367794aabf4ee433505361ec06c4fe5c38ce9 --- /dev/null +++ b/graph/incidents_graphml/3/3ac8c790-7be8-11ee-b619-8bfdf25c0d9a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.48 + 100.64.9.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699194784 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ac8c790-7be8-11ee-b619-8bfdf25c0d9a + + + diff --git a/graph/incidents_graphml/3/3ad35790-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3ad35790-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ba156790dc0bf33000c584ccb5db03975f83776a --- /dev/null +++ b/graph/incidents_graphml/3/3ad35790-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.221 + 100.64.26.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685077656 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ad35790-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3ad565a0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ad565a0-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54d7faa1193cfc60453bf9d7623c9c52b0b84739 --- /dev/null +++ b/graph/incidents_graphml/3/3ad565a0-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.107 + 100.64.60.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440518 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ad565a0-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19f2c3f65b3060fa4ccfbd86b9ca88cd0266ee34 --- /dev/null +++ b/graph/incidents_graphml/3/3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.93.253 + 100.64.93.253 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704115099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ad58d30-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3d8f0d1dc7bbfa49cc519fb0e52223b050fe0d6 --- /dev/null +++ b/graph/incidents_graphml/3/3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.6 + USER-0015-2109.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1704115099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ae607f0-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3ae62e80-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3ae62e80-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4159e5f0e3becdb9a3b25793b82c66c9ea6be139 --- /dev/null +++ b/graph/incidents_graphml/3/3ae62e80-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.107 + 100.64.60.107 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440519 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ae62e80-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3ae66030-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3ae66030-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50af6899d554bb506450484112a1767aada47e6b --- /dev/null +++ b/graph/incidents_graphml/3/3ae66030-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.165 + 100.64.58.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799218 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ae66030-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/3/3aec84e0-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3aec84e0-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e65990634ded27579395e03fb8108693a3f6db93 --- /dev/null +++ b/graph/incidents_graphml/3/3aec84e0-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.26.221 + 100.64.26.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685077656 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3aec84e0-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3af04e50-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/3af04e50-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb0b30c337fd22821cccd7309344a22ee74079b7 --- /dev/null +++ b/graph/incidents_graphml/3/3af04e50-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.173 + 100.64.81.173 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1665146431 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3af04e50-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/3/3af48660-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3af48660-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3259047aec9caac68365bbd40ac135c3b33de97 --- /dev/null +++ b/graph/incidents_graphml/3/3af48660-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.60.111 + 100.64.60.111 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440519 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3af48660-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3af8b2c0-463d-11ed-9048-e52ef683aaf1.graphml b/graph/incidents_graphml/3/3af8b2c0-463d-11ed-9048-e52ef683aaf1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3a48a7c85d4dcc402ec32e31f64b113dc74fece4 --- /dev/null +++ b/graph/incidents_graphml/3/3af8b2c0-463d-11ed-9048-e52ef683aaf1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.81.173 + 100.64.81.173 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1665146431 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3af8b2c0-463d-11ed-9048-e52ef683aaf1 + + + diff --git a/graph/incidents_graphml/3/3af9de10-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3af9de10-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fee0cf052d58a434da7425d8597e39154e99b40a --- /dev/null +++ b/graph/incidents_graphml/3/3af9de10-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.31.6 + USER-0015-2109.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704115099 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3af9de10-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3afaa500-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3afaa500-21eb-11ee-a8c2-a10defe0b4b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d50a86be1b3f334600a4d276876a7a794f6925d --- /dev/null +++ b/graph/incidents_graphml/3/3afaa500-21eb-11ee-a8c2-a10defe0b4b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300468 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3afaa500-21eb-11ee-a8c2-a10defe0b4b5 + + + diff --git a/graph/incidents_graphml/3/3b03efb0-3e7a-11ee-bf13-37e75aa85278.graphml b/graph/incidents_graphml/3/3b03efb0-3e7a-11ee-bf13-37e75aa85278.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70e4ff9cbf90ba28854a9e2277ddd20ce3187625 --- /dev/null +++ b/graph/incidents_graphml/3/3b03efb0-3e7a-11ee-bf13-37e75aa85278.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.111 + 100.64.60.111 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692440519 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b03efb0-3e7a-11ee-bf13-37e75aa85278 + + + diff --git a/graph/incidents_graphml/3/3b0913c0-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3b0913c0-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce55473f700359afc28d63b2e38f98e14656d654 --- /dev/null +++ b/graph/incidents_graphml/3/3b0913c0-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.91 + 100.64.13.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802619 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b0913c0-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3b0db730-e31f-11ee-acbf-dfdefbfef3c0.graphml b/graph/incidents_graphml/3/3b0db730-e31f-11ee-acbf-dfdefbfef3c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e6bed3396cf1069e89db9fd3fec1f6d47d870d58 --- /dev/null +++ b/graph/incidents_graphml/3/3b0db730-e31f-11ee-acbf-dfdefbfef3c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.226 + 100.64.68.226 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","Okta","PAN NGFW"] + + + INCIDENT_LINK + 1710543376 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b0db730-e31f-11ee-acbf-dfdefbfef3c0 + + + diff --git a/graph/incidents_graphml/3/3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0571a748578595eda192a70314430c199f4d1289 --- /dev/null +++ b/graph/incidents_graphml/3/3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.208 + 100.64.11.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + INCIDENT_LINK + 1704115099 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b0e2960-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3b139070-540d-11ee-99ed-211c2b4ec819.graphml b/graph/incidents_graphml/3/3b139070-540d-11ee-99ed-211c2b4ec819.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e1c3d5565c7efa66ee24add802435de9c878e49 --- /dev/null +++ b/graph/incidents_graphml/3/3b139070-540d-11ee-99ed-211c2b4ec819.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.93.136 + 100.64.93.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694812629 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b139070-540d-11ee-99ed-211c2b4ec819 + + + diff --git a/graph/incidents_graphml/3/3b147200-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/3/3b147200-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9febc63eabeb74d74c62e97edf23877ad114df22 --- /dev/null +++ b/graph/incidents_graphml/3/3b147200-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.254 + 100.64.38.254 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971315 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b147200-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/3/3b19b590-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3b19b590-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be9bf989ecee5c795fc50c4f8c978b80c9957852 --- /dev/null +++ b/graph/incidents_graphml/3/3b19b590-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.91 + 100.64.13.91 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802619 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b19b590-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3b1d3960-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b1d3960-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c857d0b8d048b7928a06a2198760d06e7d13153e --- /dev/null +++ b/graph/incidents_graphml/3/3b1d3960-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.8 + 100.64.12.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856209 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b1d3960-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b208700-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3b208700-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e1fbf519e68aec47e5ed6aa5f28c6b7fb3d9132 --- /dev/null +++ b/graph/incidents_graphml/3/3b208700-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.10.83 + 100.64.10.83 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821677 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b208700-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3b222da0-82f8-11ee-9f73-dbbba1248bb5.graphml b/graph/incidents_graphml/3/3b222da0-82f8-11ee-9f73-dbbba1248bb5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d05269e2985772bf5e4924f2635f0baaa5bc416a --- /dev/null +++ b/graph/incidents_graphml/3/3b222da0-82f8-11ee-9f73-dbbba1248bb5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.1 + 100.64.39.1 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699971315 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b222da0-82f8-11ee-9f73-dbbba1248bb5 + + + diff --git a/graph/incidents_graphml/3/3b2389c0-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3b2389c0-21eb-11ee-a8c2-a10defe0b4b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cad58deb0774d8cbb7410952c82fc90d9020853c --- /dev/null +++ b/graph/incidents_graphml/3/3b2389c0-21eb-11ee-a8c2-a10defe0b4b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.24 + 100.64.21.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300469 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b2389c0-21eb-11ee-a8c2-a10defe0b4b5 + + + diff --git a/graph/incidents_graphml/3/3b2ad930-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3b2ad930-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..098e55ad4129ce8cd7b68af24c65cfd7d8770ccc --- /dev/null +++ b/graph/incidents_graphml/3/3b2ad930-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.123 + 100.64.27.123 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + INCIDENT_LINK + 1696783160 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b2ad930-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bcfe7715f20cebf7b603b27dc62f988e6c5557da --- /dev/null +++ b/graph/incidents_graphml/3/3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.163 + 100.64.20.163 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130589 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b2d98b0-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/3/3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d4f4be5a5cbe8ad5b1972dcd5ac37f0b047af526 --- /dev/null +++ b/graph/incidents_graphml/3/3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + USER-0015-1039.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.11.208 + 100.64.11.208 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1704115099 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b33d9d0-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3b357c50-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b357c50-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5ed9b0044a09b4e7c22588e0a2f16cbd0fa64917 --- /dev/null +++ b/graph/incidents_graphml/3/3b357c50-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.8 + 100.64.12.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b357c50-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b35dbd0-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3b35dbd0-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79d6ecd71c5b73c371fdf839e2b3925a2e1e4805 --- /dev/null +++ b/graph/incidents_graphml/3/3b35dbd0-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.154 + 100.64.14.154 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766320 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b35dbd0-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3b3b53f0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3b3b53f0-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c75434dd6d388b49f9b66810f1a415e45a9924d2 --- /dev/null +++ b/graph/incidents_graphml/3/3b3b53f0-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.27.123 + 100.64.27.123 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696783161 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b3b53f0-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/3b3d0200-4dd9-11ee-b3c2-8d33e6517b90.graphml b/graph/incidents_graphml/3/3b3d0200-4dd9-11ee-b3c2-8d33e6517b90.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9a328b2cc747625076ee57e86e47f857a2e4391 --- /dev/null +++ b/graph/incidents_graphml/3/3b3d0200-4dd9-11ee-b3c2-8d33e6517b90.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.163 + 100.64.20.163 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694130589 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b3d0200-4dd9-11ee-b3c2-8d33e6517b90 + + + diff --git a/graph/incidents_graphml/3/3b436dc0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/3/3b436dc0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae1a151e22aed23822520620a2581856d4f33d5a --- /dev/null +++ b/graph/incidents_graphml/3/3b436dc0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.120 + 100.64.78.120 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.3.124 + 100.64.3.124 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.78.121 + 100.64.78.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783008 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b436dc0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/3/3b43fb40-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b43fb40-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2d77c6249f0597a7ed66a198c336c04801e1410 --- /dev/null +++ b/graph/incidents_graphml/3/3b43fb40-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.14 + 100.64.12.14 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b43fb40-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b4800f0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3b4800f0-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46979fb1542db6aa3d265b3228c7f073f652e93b --- /dev/null +++ b/graph/incidents_graphml/3/3b4800f0-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.25 + 100.64.2.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685210371 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b4800f0-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/3b487970-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3b487970-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..163b034456d8a6ce4fbc971ca7f1735567f17e13 --- /dev/null +++ b/graph/incidents_graphml/3/3b487970-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.154 + 100.64.14.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766320 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b487970-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3b4984c0-65f9-11ee-b910-4dbb90e8cc17.graphml b/graph/incidents_graphml/3/3b4984c0-65f9-11ee-b910-4dbb90e8cc17.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e845d7725c0535a0371ba47493e0dc667840fd30 --- /dev/null +++ b/graph/incidents_graphml/3/3b4984c0-65f9-11ee-b910-4dbb90e8cc17.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.48.81 + USER-0015-2095.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696783161 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b4984c0-65f9-11ee-b910-4dbb90e8cc17 + + + diff --git a/graph/incidents_graphml/3/3b52c850-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b52c850-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16ea0c9c3bab3b910acf32526176c991621cfc3e --- /dev/null +++ b/graph/incidents_graphml/3/3b52c850-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.14 + 100.64.12.14 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b52c850-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b5348d0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3b5348d0-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f8c43a477fd0e1c908fc2a5b6c781bfddece988 --- /dev/null +++ b/graph/incidents_graphml/3/3b5348d0-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.87 + 100.64.7.87 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061835 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b5348d0-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3b605ce0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b605ce0-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82dbf77348b7dc05ea3790fed23eda08f9f9ea6e --- /dev/null +++ b/graph/incidents_graphml/3/3b605ce0-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.9 + 100.64.12.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b605ce0-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..30437c4d72ffa01065a96acc7f2b43eccde2dff7 --- /dev/null +++ b/graph/incidents_graphml/3/3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.2.25 + 100.64.2.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685210372 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b6c03b0-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/3b6daea0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3b6daea0-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e50acd17490f69e196b5686cb9cbeaa803d00b7d --- /dev/null +++ b/graph/incidents_graphml/3/3b6daea0-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.87 + 100.64.7.87 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061835 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b6daea0-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3b6f5100-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b6f5100-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b1bd23df3b26cc4344929ae2f854273b0015419 --- /dev/null +++ b/graph/incidents_graphml/3/3b6f5100-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.9 + 100.64.12.9 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b6f5100-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b6f87e0-0494-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3b6f87e0-0494-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de2393caf9ab6155155c36387b4cfe86cec39ab4 --- /dev/null +++ b/graph/incidents_graphml/3/3b6f87e0-0494-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.204 + 100.64.38.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1686074519 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b6f87e0-0494-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3b768460-30ed-11ef-bae8-75e6361c756f.graphml b/graph/incidents_graphml/3/3b768460-30ed-11ef-bae8-75e6361c756f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccaf6838a7be127b91842701630dcddff1333df5 --- /dev/null +++ b/graph/incidents_graphml/3/3b768460-30ed-11ef-bae8-75e6361c756f.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.23 + 100.64.15.23 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.63 + 100.64.53.63 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.197 + 100.64.7.197 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.53.64 + 100.64.53.64 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + INCIDENT_LINK + 1719098093 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b768460-30ed-11ef-bae8-75e6361c756f + + + diff --git a/graph/incidents_graphml/3/3b7d7410-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3b7d7410-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e707ce9a1187f461c70be88100a98fa5addc4981 --- /dev/null +++ b/graph/incidents_graphml/3/3b7d7410-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.85 + 100.64.10.85 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821677 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3b7d7410-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3b7da8e0-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b7da8e0-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0379a8b4aac5707f05daf5bd03008806c43c4c8b --- /dev/null +++ b/graph/incidents_graphml/3/3b7da8e0-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.16 + 100.64.12.16 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b7da8e0-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b879a60-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/3/3b879a60-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f2268ed0da6bfa66090a29203f705bfed0cbef8a --- /dev/null +++ b/graph/incidents_graphml/3/3b879a60-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.200 + 100.64.58.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038047 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b879a60-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/3/3b8dae70-81ec-11ee-a529-e575d13068e1.graphml b/graph/incidents_graphml/3/3b8dae70-81ec-11ee-a529-e575d13068e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..828c51df255a36e3b5616a3d19d30c360d9e23e3 --- /dev/null +++ b/graph/incidents_graphml/3/3b8dae70-81ec-11ee-a529-e575d13068e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.16 + 100.64.12.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699856210 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3b8dae70-81ec-11ee-a529-e575d13068e1 + + + diff --git a/graph/incidents_graphml/3/3b8dde90-7437-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/3/3b8dde90-7437-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f337ea802932d447e2a3dfce2f3becb4fa0a4f0 --- /dev/null +++ b/graph/incidents_graphml/3/3b8dde90-7437-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.138 + 100.64.71.138 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.139 + 100.64.71.139 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1670201608 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b8dde90-7437-11ed-85ba-bb75aa2d6818 + + + INCIDENT_LINK + 1670201608 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b8dde90-7437-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/3/3b978140-21eb-11ee-a8c2-a10defe0b4b5.graphml b/graph/incidents_graphml/3/3b978140-21eb-11ee-a8c2-a10defe0b4b5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ec9866272f405952561c84c79142fc0ccba54fa --- /dev/null +++ b/graph/incidents_graphml/3/3b978140-21eb-11ee-a8c2-a10defe0b4b5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.34 + 100.64.30.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300469 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b978140-21eb-11ee-a8c2-a10defe0b4b5 + + + diff --git a/graph/incidents_graphml/3/3b9e90a0-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3b9e90a0-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7dd4a69f12566c6d5445c2f21b770e5c8bc5c501 --- /dev/null +++ b/graph/incidents_graphml/3/3b9e90a0-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.10.85 + 100.64.10.85 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821677 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3b9e90a0-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3b9f0d80-548f-11ee-81a7-334be12fd476.graphml b/graph/incidents_graphml/3/3b9f0d80-548f-11ee-81a7-334be12fd476.graphml new file mode 100644 index 0000000000000000000000000000000000000000..baa8746e27ca4fa6750ae69589a29ea76d616071 --- /dev/null +++ b/graph/incidents_graphml/3/3b9f0d80-548f-11ee-81a7-334be12fd476.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.68 + 100.64.18.68 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694868465 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3b9f0d80-548f-11ee-81a7-334be12fd476 + + + diff --git a/graph/incidents_graphml/3/3ba1eda0-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3ba1eda0-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..21251a7010b7da9df3a08dbce88a229b0bc153d2 --- /dev/null +++ b/graph/incidents_graphml/3/3ba1eda0-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.128 + 100.64.49.128 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927929 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3ba1eda0-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3ba2a5d0-0494-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3ba2a5d0-0494-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78121bfd8ae28327f0dd4afe3af8a8b3cacb2ae2 --- /dev/null +++ b/graph/incidents_graphml/3/3ba2a5d0-0494-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.206 + 100.64.38.206 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1686074519 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ba2a5d0-0494-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3ba4cda0-a8b4-11ee-bb9e-f554981233b0.graphml b/graph/incidents_graphml/3/3ba4cda0-a8b4-11ee-bb9e-f554981233b0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a0a112a205834eef7530ba41e03dd8d9e063226 --- /dev/null +++ b/graph/incidents_graphml/3/3ba4cda0-a8b4-11ee-bb9e-f554981233b0.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.143 + 100.64.26.143 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.53 + 100.64.68.53 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Protect","CASB"] + + + INCIDENT_LINK + 1704120254 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ba4cda0-a8b4-11ee-bb9e-f554981233b0 + + + INCIDENT_LINK + 1704120254 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ba4cda0-a8b4-11ee-bb9e-f554981233b0 + + + diff --git a/graph/incidents_graphml/3/3bacd5a0-1f88-11ee-b26a-cbff99af2cd4.graphml b/graph/incidents_graphml/3/3bacd5a0-1f88-11ee-b26a-cbff99af2cd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..db01864515d2363bd985e382fdae86b688da8486 --- /dev/null +++ b/graph/incidents_graphml/3/3bacd5a0-1f88-11ee-b26a-cbff99af2cd4.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.200 + 100.64.58.200 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689038047 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3bacd5a0-1f88-11ee-b26a-cbff99af2cd4 + + + diff --git a/graph/incidents_graphml/3/3bb066f0-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bb066f0-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c526c889b94c10613aa27a453fe9f3c8c82952da --- /dev/null +++ b/graph/incidents_graphml/3/3bb066f0-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.182 + 100.64.25.182 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bb066f0-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/3/3bb73cc0-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3bb73cc0-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..95921209f815c3d8f5584b5c59528a1be0d1513f --- /dev/null +++ b/graph/incidents_graphml/3/3bb73cc0-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.134 + 100.64.12.134 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3bb73cc0-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3bc38da0-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3bc38da0-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c31a724408fb75b3a336f94a1aebe99f3a5ca453 --- /dev/null +++ b/graph/incidents_graphml/3/3bc38da0-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.29 + 100.64.81.29 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.21 + USER-0015-1611.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923420 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bc38da0-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923420 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bc38da0-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/3/3bc59ca0-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bc59ca0-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40af984e26f9169985d6b2d072ec9a46d03ef05d --- /dev/null +++ b/graph/incidents_graphml/3/3bc59ca0-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.182 + 100.64.25.182 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799219 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3bc59ca0-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/3/3bca1d50-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3bca1d50-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51b9376ec00abd3cfe77ae32a0238edd6c009c75 --- /dev/null +++ b/graph/incidents_graphml/3/3bca1d50-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.30 + 100.64.81.30 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.232 + 100.64.71.232 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923420 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bca1d50-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923420 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bca1d50-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/3/3bcb6d00-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3bcb6d00-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98f0a19b2443afba3bfe5df10ae40e2474f9e030 --- /dev/null +++ b/graph/incidents_graphml/3/3bcb6d00-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.87 + 100.64.10.87 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bcb6d00-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3bd2df20-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3bd2df20-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66a1ea65a0320125b8b0160704d067c787d99e71 --- /dev/null +++ b/graph/incidents_graphml/3/3bd2df20-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.4.216 + 100.64.4.216 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713766321 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3bd2df20-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3bd32aa0-0c5d-11ed-b597-112eae6df069.graphml b/graph/incidents_graphml/3/3bd32aa0-0c5d-11ed-b597-112eae6df069.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16d95c4d555eac34aa43ecb5e4761b66151f0f77 --- /dev/null +++ b/graph/incidents_graphml/3/3bd32aa0-0c5d-11ed-b597-112eae6df069.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.122 + 100.64.78.122 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.18 + USER-0015-1780.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1658783009 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3bd32aa0-0c5d-11ed-b597-112eae6df069 + + + INCIDENT_LINK + 1658783009 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3bd32aa0-0c5d-11ed-b597-112eae6df069 + + + diff --git a/graph/incidents_graphml/3/3bd4cbb0-f25b-11ec-b513-c302b572dea2.graphml b/graph/incidents_graphml/3/3bd4cbb0-f25b-11ec-b513-c302b572dea2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2dd8c57dd263deccff332225501eb58274eac955 --- /dev/null +++ b/graph/incidents_graphml/3/3bd4cbb0-f25b-11ec-b513-c302b572dea2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.31 + 100.64.81.31 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.81.1 + 100.64.81.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655923420 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd4cbb0-f25b-11ec-b513-c302b572dea2 + + + INCIDENT_LINK + 1655923420 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd4cbb0-f25b-11ec-b513-c302b572dea2 + + + diff --git a/graph/incidents_graphml/3/3bd7c510-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bd7c510-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..606ffe2798af8ba018a040003f210211f6cb0fde --- /dev/null +++ b/graph/incidents_graphml/3/3bd7c510-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799219 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd7c510-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/3/3bd9fc20-dbb1-11ee-a665-15e5a5884e11.graphml b/graph/incidents_graphml/3/3bd9fc20-dbb1-11ee-a665-15e5a5884e11.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81e26d769a8ec57b2200010f057db0a52ab7fd07 --- /dev/null +++ b/graph/incidents_graphml/3/3bd9fc20-dbb1-11ee-a665-15e5a5884e11.graphml @@ -0,0 +1,337 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.22 + 100.64.51.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.21 + 100.64.24.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.23 + 100.64.51.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.24 + 100.64.51.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.25 + 100.64.51.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.26 + 100.64.51.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.27 + 100.64.51.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + INCIDENT_LINK + 1709726475 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3bd9fc20-dbb1-11ee-a665-15e5a5884e11 + + + diff --git a/graph/incidents_graphml/3/3be72a70-006f-11ef-9e1d-8b16c75f4754.graphml b/graph/incidents_graphml/3/3be72a70-006f-11ef-9e1d-8b16c75f4754.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b60b6c2c4f7b821be46b043c554fe3bf1fcc1aa6 --- /dev/null +++ b/graph/incidents_graphml/3/3be72a70-006f-11ef-9e1d-8b16c75f4754.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.216 + 100.64.4.216 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1713766321 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3be72a70-006f-11ef-9e1d-8b16c75f4754 + + + diff --git a/graph/incidents_graphml/3/3be8b900-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3be8b900-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a2592ee724ae436af251189c0bf1d2218d80b640 --- /dev/null +++ b/graph/incidents_graphml/3/3be8b900-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.10.87 + 100.64.10.87 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1684821678 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3be8b900-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3bee5a50-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3bee5a50-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..84401d193ff6395fc7653f7b867221d3c736a8bb --- /dev/null +++ b/graph/incidents_graphml/3/3bee5a50-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.54 + 100.64.39.54 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799219 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3bee5a50-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/3/3bef96e0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3bef96e0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54c6fc96c20f152b8844ab81557c6ab3aae6e1cc --- /dev/null +++ b/graph/incidents_graphml/3/3bef96e0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.232 + 100.64.22.232 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300899 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3bef96e0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/3/3bf7ed40-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3bf7ed40-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64c6a02d1f6286dee64210748fd292800cc4792d --- /dev/null +++ b/graph/incidents_graphml/3/3bf7ed40-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.89 + 100.64.7.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3bf7ed40-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4825aa1b72cc8a4c0de8ba601e08fcd5d1ff8128 --- /dev/null +++ b/graph/incidents_graphml/3/3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.19.248 + USER-0015-1221.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1704115100 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3bf973c0-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3c043040-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3c043040-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb084de7eff66a7a68b64503c2b22e1822f5b4c9 --- /dev/null +++ b/graph/incidents_graphml/3/3c043040-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c043040-f92f-11ed-ab43-ff746e796bda + + + INCIDENT_LINK + 1684821678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c043040-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3c090640-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c090640-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4b1cf1f8c2d28d79370ec373049748318870e38 --- /dev/null +++ b/graph/incidents_graphml/3/3c090640-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.46 + 100.64.11.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3c090640-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435.graphml b/graph/incidents_graphml/3/3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d21a43463ea965b64b903e1a5784367ea79a3f24 --- /dev/null +++ b/graph/incidents_graphml/3/3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.248 + USER-0015-1221.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1704115101 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c0ed080-a8a8-11ee-b6d0-fbb5aa38f435 + + + diff --git a/graph/incidents_graphml/3/3c17ec00-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3c17ec00-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..481b7eae5b14e853b400ca8b8f0676a46db929b3 --- /dev/null +++ b/graph/incidents_graphml/3/3c17ec00-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.20 + 100.64.57.20 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597086 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c17ec00-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3c1c2da0-27a9-11ee-82e1-59dd32b62381.graphml b/graph/incidents_graphml/3/3c1c2da0-27a9-11ee-82e1-59dd32b62381.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f88e0e841b36fe14b0d702e010f2fcf383b0ad75 --- /dev/null +++ b/graph/incidents_graphml/3/3c1c2da0-27a9-11ee-82e1-59dd32b62381.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.177 + 100.64.56.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689931830 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3c1c2da0-27a9-11ee-82e1-59dd32b62381 + + + diff --git a/graph/incidents_graphml/3/3c1c9a40-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3c1c9a40-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bbc42a9377c2acb7989ff212200562a66737aa1 --- /dev/null +++ b/graph/incidents_graphml/3/3c1c9a40-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.10.89 + 100.64.10.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821678 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c1c9a40-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3c25db10-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3c25db10-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a318d8d3fe7b4195673990680f9513595e984e8f --- /dev/null +++ b/graph/incidents_graphml/3/3c25db10-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.89 + 100.64.7.89 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061836 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c25db10-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3c2a6420-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3c2a6420-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c6a694bcf9ba008db15dec3871808993a6b6fd5 --- /dev/null +++ b/graph/incidents_graphml/3/3c2a6420-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.43 + 100.64.10.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961535 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c2a6420-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/3c2cfaa0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3c2cfaa0-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a54cc73ec47d19a04b8c96dcf18382e55d4202bd --- /dev/null +++ b/graph/incidents_graphml/3/3c2cfaa0-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.20 + 100.64.57.20 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597086 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c2cfaa0-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3c3336c0-2435-11ee-bc29-cfb067a56058.graphml b/graph/incidents_graphml/3/3c3336c0-2435-11ee-bc29-cfb067a56058.graphml new file mode 100644 index 0000000000000000000000000000000000000000..04b75cb7e44070d04937956a7b6758edbdc730f2 --- /dev/null +++ b/graph/incidents_graphml/3/3c3336c0-2435-11ee-bc29-cfb067a56058.graphml @@ -0,0 +1,169 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.92 + 100.64.69.92 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.325 + ["Precinct"] + + + HOST + 100.64.11.123 + 100.64.11.123 + ["Exploiting Target","Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + INCIDENT_LINK + 1689552155 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 3c3336c0-2435-11ee-bc29-cfb067a56058 + + + diff --git a/graph/incidents_graphml/3/3c3a42a0-5e80-11ee-b169-95f488d76cb0.graphml b/graph/incidents_graphml/3/3c3a42a0-5e80-11ee-b169-95f488d76cb0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9b1d47fb5dd2493113b436e3be0a5ff51734569b --- /dev/null +++ b/graph/incidents_graphml/3/3c3a42a0-5e80-11ee-b169-95f488d76cb0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.43 + 100.64.10.43 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695961535 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c3a42a0-5e80-11ee-b169-95f488d76cb0 + + + diff --git a/graph/incidents_graphml/3/3c48f570-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c48f570-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f529ba16fa800c96557df2b86c20b8f42059fdbc --- /dev/null +++ b/graph/incidents_graphml/3/3c48f570-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.138 + 100.64.12.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c48f570-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3c4bf400-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3c4bf400-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..955e997661c65ff71b4c0a62c578dabb13149927 --- /dev/null +++ b/graph/incidents_graphml/3/3c4bf400-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.93 + 100.64.13.93 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802621 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c4bf400-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3c531530-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3c531530-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f26247be798639542fdddc297f8ab05c5ae087d --- /dev/null +++ b/graph/incidents_graphml/3/3c531530-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.122 + 100.64.49.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c531530-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3c5400f0-41f3-11ed-a891-2d9e83e3a063.graphml b/graph/incidents_graphml/3/3c5400f0-41f3-11ed-a891-2d9e83e3a063.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5922d5cc8d0645b3b0875a1a75966fe3c824ef18 --- /dev/null +++ b/graph/incidents_graphml/3/3c5400f0-41f3-11ed-a891-2d9e83e3a063.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.190.96.179 + 100.64.94.50 + [] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.94.51 + 100.64.94.51 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1664674846 + malicious + 0.7 + 0.578125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host"] + complete-mission + Disrupted + 3c5400f0-41f3-11ed-a891-2d9e83e3a063 + + + diff --git a/graph/incidents_graphml/3/3c592210-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c592210-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..143554dc9c7c1f3ac65476e1316a2c85342a56ef --- /dev/null +++ b/graph/incidents_graphml/3/3c592210-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.138 + 100.64.12.138 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810484 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c592210-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3c5b0f30-5d0e-11ee-9c46-6338cea7f59f.graphml b/graph/incidents_graphml/3/3c5b0f30-5d0e-11ee-9c46-6338cea7f59f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9d1e33ceeb9d4abdbf6ac1ca65d4e8186f3ec9f --- /dev/null +++ b/graph/incidents_graphml/3/3c5b0f30-5d0e-11ee-9c46-6338cea7f59f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.93 + 100.64.13.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695802621 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c5b0f30-5d0e-11ee-9c46-6338cea7f59f + + + diff --git a/graph/incidents_graphml/3/3c664170-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c664170-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9973206d40e128494ec9454f32ed61277a56ef6b --- /dev/null +++ b/graph/incidents_graphml/3/3c664170-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.140 + 100.64.12.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c664170-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3c67ec60-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3c67ec60-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a4da123a9b91e8d58c79a36adfbde89530eef748 --- /dev/null +++ b/graph/incidents_graphml/3/3c67ec60-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.19 + 100.64.92.19 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1666302209 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c67ec60-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/3/3c6ba640-0c57-11ee-a19d-25527a25a69c.graphml b/graph/incidents_graphml/3/3c6ba640-0c57-11ee-a19d-25527a25a69c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed2c5f46d5b5a386a6faa5145655b751da1c9f77 --- /dev/null +++ b/graph/incidents_graphml/3/3c6ba640-0c57-11ee-a19d-25527a25a69c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.122 + 100.64.49.122 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686927931 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3c6ba640-0c57-11ee-a19d-25527a25a69c + + + diff --git a/graph/incidents_graphml/3/3c6d1c80-50c0-11ed-875b-db834c6ab2cd.graphml b/graph/incidents_graphml/3/3c6d1c80-50c0-11ed-875b-db834c6ab2cd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edc68e5705cd7cab4b676f624d918381f0009834 --- /dev/null +++ b/graph/incidents_graphml/3/3c6d1c80-50c0-11ed-875b-db834c6ab2cd.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.92.19 + 100.64.92.19 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1666302209 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c6d1c80-50c0-11ed-875b-db834c6ab2cd + + + diff --git a/graph/incidents_graphml/3/3c750e80-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3c750e80-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e56f10490e38c748d15662930908ca5fdf5af4ec --- /dev/null +++ b/graph/incidents_graphml/3/3c750e80-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.140 + 100.64.12.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810484 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c750e80-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3c768e70-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c768e70-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1a3ce4503a77d004491f2e13c8e976f4c953b56 --- /dev/null +++ b/graph/incidents_graphml/3/3c768e70-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.190 + 100.64.92.190 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c768e70-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c7a10e0-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c7a10e0-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a64eb2d361565d4db1fbfa76159952408d35d03 --- /dev/null +++ b/graph/incidents_graphml/3/3c7a10e0-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.225 + 100.64.5.225 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c7a10e0-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c7f6810-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c7f6810-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..978a038bc8454d1ab78e793dcca49c411bf19c15 --- /dev/null +++ b/graph/incidents_graphml/3/3c7f6810-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.5.225 + 100.64.5.225 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c7f6810-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c82c370-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c82c370-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2182b9ab55a26febd7417e1b57dace9623274b44 --- /dev/null +++ b/graph/incidents_graphml/3/3c82c370-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.192 + 100.64.92.192 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c82c370-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c881aa0-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c881aa0-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f83aa7e66529115992e140450c66b55845790705 --- /dev/null +++ b/graph/incidents_graphml/3/3c881aa0-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.192 + 100.64.92.192 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c881aa0-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c8cae80-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c8cae80-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bac2878a015821b61d18bf413514fcc30fd65b81 --- /dev/null +++ b/graph/incidents_graphml/3/3c8cae80-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.92.194 + 100.64.92.194 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3c8cae80-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c908c70-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3c908c70-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e27f120b08d0769633d697fdfe9abe1ed996ea02 --- /dev/null +++ b/graph/incidents_graphml/3/3c908c70-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.115 + 100.64.13.115 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3c908c70-2b9d-11ee-a75c-6705ed43e196 + + + INCIDENT_LINK + 1690366482 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3c908c70-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3c931cf0-2481-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/3/3c931cf0-2481-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64a8b6542631952d10c7e9844aea2d20da5763c4 --- /dev/null +++ b/graph/incidents_graphml/3/3c931cf0-2481-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.243 + 100.64.23.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717732295 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3c931cf0-2481-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/3/3c933e30-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c933e30-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a3a5ce38da633d2e31221c3d61762ed3b0acd825 --- /dev/null +++ b/graph/incidents_graphml/3/3c933e30-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.92.194 + 100.64.92.194 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c933e30-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3c9d0230-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3c9d0230-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e77f39627b934be81f60fb4b499bd7c10c7f0817 --- /dev/null +++ b/graph/incidents_graphml/3/3c9d0230-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.231 + 100.64.84.231 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.200 + 100.64.92.200 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662210394 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3c9d0230-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3ca71a20-2481-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/3/3ca71a20-2481-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..785d7dab2a11daabde2fe55bad2b5fcd39732ed2 --- /dev/null +++ b/graph/incidents_graphml/3/3ca71a20-2481-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.245 + 100.64.23.245 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717732295 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3ca71a20-2481-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/3/3ca8cf60-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3ca8cf60-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56b4fccb85f60daa63e0bf68cc965404bda391a8 --- /dev/null +++ b/graph/incidents_graphml/3/3ca8cf60-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.115 + 100.64.13.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3ca8cf60-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3cae0b00-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cae0b00-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..498e300e09c020e8a7b222dc17fae1273fe89156 --- /dev/null +++ b/graph/incidents_graphml/3/3cae0b00-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.14 + 100.64.41.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685077659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cae0b00-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..513152e5a40e791ebe741db9628896e13aa6dcb4 --- /dev/null +++ b/graph/incidents_graphml/3/3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.91 + 100.64.7.91 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061837 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb0b5f0-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3cb3db40-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3cb3db40-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0881103dfab06d3d6daf291b87f1e88773809820 --- /dev/null +++ b/graph/incidents_graphml/3/3cb3db40-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.152 + 100.64.78.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + INCIDENT_LINK + 1706165090 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3cb3db40-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/3cb48880-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3cb48880-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b521e1bd5f133c9b7e6c240d279eae3b2f94bd50 --- /dev/null +++ b/graph/incidents_graphml/3/3cb48880-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.142 + 100.64.12.142 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810485 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cb48880-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3cb87d70-af33-11ed-996b-a522ebb85241.graphml b/graph/incidents_graphml/3/3cb87d70-af33-11ed-996b-a522ebb85241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..599308addfab73fc3881ec1add99fc2841ffb86a --- /dev/null +++ b/graph/incidents_graphml/3/3cb87d70-af33-11ed-996b-a522ebb85241.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.23 + 100.64.85.23 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.85.24 + 100.64.85.24 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.25 + 100.64.85.25 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.223 + 100.64.34.223 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.26 + 100.64.85.26 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.188 + 100.64.18.188 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.27 + 100.64.85.27 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.28 + 100.64.85.28 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.150 + 100.64.8.150 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.29 + 100.64.85.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.85.30 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.16.10 + 100.64.16.10 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.31 + 100.64.85.31 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.32 + 100.64.85.32 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.33 + 100.64.85.33 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.34 + 100.64.85.34 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.126 + 100.64.26.126 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.85.35 + 100.64.85.35 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + INCIDENT_LINK + 1676687011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cb87d70-af33-11ed-996b-a522ebb85241 + + + diff --git a/graph/incidents_graphml/3/3cbc9df0-2481-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/3/3cbc9df0-2481-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8873ab703dc833ae20afe85bad1408df3471ddf --- /dev/null +++ b/graph/incidents_graphml/3/3cbc9df0-2481-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.245 + 100.64.23.245 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717732296 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cbc9df0-2481-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/3/3cc004b0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3cc004b0-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..92a682e9a292243cdd95a8a1f55bc21869c10e20 --- /dev/null +++ b/graph/incidents_graphml/3/3cc004b0-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.8.114 + 100.64.8.114 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659730051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cc004b0-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3cc16070-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3cc16070-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..287e66ef3bd74b2bae8f8ef7a186cf657416d483 --- /dev/null +++ b/graph/incidents_graphml/3/3cc16070-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366482 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3cc16070-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3cc196e0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3cc196e0-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a69b0df7e8dffad1b64a0585ee5e8bb5a567a5c --- /dev/null +++ b/graph/incidents_graphml/3/3cc196e0-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.78.152 + 100.64.78.152 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706165090 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cc196e0-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/3cc42b10-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cc42b10-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28e0d146cc5b11a50d6241139fd474750d2ef0d3 --- /dev/null +++ b/graph/incidents_graphml/3/3cc42b10-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.14 + 100.64.41.14 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685077659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cc42b10-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3cc614b0-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3cc614b0-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b5bb885b3c957bd5e94e35bf631529c43541c8f --- /dev/null +++ b/graph/incidents_graphml/3/3cc614b0-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.2 + 100.64.8.2 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810485 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3cc614b0-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e73d071591ce38da7b12006a5e514278fdf4b7d9 --- /dev/null +++ b/graph/incidents_graphml/3/3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.91 + 100.64.7.91 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061837 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cc8f8e0-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3ccaa950-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3ccaa950-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b757df4ac7f92eccf5fb7d498cca37e061fadc81 --- /dev/null +++ b/graph/incidents_graphml/3/3ccaa950-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.188 + 100.64.20.188 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685210374 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ccaa950-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/3ccad7a0-784f-11ee-8281-459da66dfacb.graphml b/graph/incidents_graphml/3/3ccad7a0-784f-11ee-8281-459da66dfacb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c186991fc0d2df4f658551408e9611b1f1a91471 --- /dev/null +++ b/graph/incidents_graphml/3/3ccad7a0-784f-11ee-8281-459da66dfacb.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.11 + USER-0015-1482.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698799221 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3ccad7a0-784f-11ee-8281-459da66dfacb + + + diff --git a/graph/incidents_graphml/3/3ccd7dc0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3ccd7dc0-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c850ad2043bc278ea9e1e0ecdfc060c03cab882 --- /dev/null +++ b/graph/incidents_graphml/3/3ccd7dc0-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.94.127 + 100.64.94.127 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1706165090 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3ccd7dc0-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/3cd190e0-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3cd190e0-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cfbef91ae1d035129521b4afe0f0f6242e41f49 --- /dev/null +++ b/graph/incidents_graphml/3/3cd190e0-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.95.233 + 100.64.95.233 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1659730051 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3cd190e0-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3cd5d2d0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3cd5d2d0-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee754ef5c3e74b9ce82ddcb5c07f00e3833378b8 --- /dev/null +++ b/graph/incidents_graphml/3/3cd5d2d0-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.51 + 100.64.7.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366482 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cd5d2d0-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3cda00e0-bb4d-11ee-a6c4-95259d299227.graphml b/graph/incidents_graphml/3/3cda00e0-bb4d-11ee-a6c4-95259d299227.graphml new file mode 100644 index 0000000000000000000000000000000000000000..455b6c61e8e48b5f6d7fa579c7e48542a8953876 --- /dev/null +++ b/graph/incidents_graphml/3/3cda00e0-bb4d-11ee-a6c4-95259d299227.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.6.51 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.94.127 + 100.64.94.127 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1706165090 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cda00e0-bb4d-11ee-a6c4-95259d299227 + + + diff --git a/graph/incidents_graphml/3/3cda9190-14fa-11ed-995a-47ed1ad8ede7.graphml b/graph/incidents_graphml/3/3cda9190-14fa-11ed-995a-47ed1ad8ede7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a22333d8cc0a8329d3fb09788b6c378a8905d8b7 --- /dev/null +++ b/graph/incidents_graphml/3/3cda9190-14fa-11ed-995a-47ed1ad8ede7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.95.233 + 100.64.95.233 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1659730051 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cda9190-14fa-11ed-995a-47ed1ad8ede7 + + + diff --git a/graph/incidents_graphml/3/3cdbaab0-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cdbaab0-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..198cb4f1f9bddd37405336444541b90c2e15b6eb --- /dev/null +++ b/graph/incidents_graphml/3/3cdbaab0-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.16 + 100.64.41.16 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1685077659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cdbaab0-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3cdc40d0-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3cdc40d0-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fbfba412d6b28e4eb7c13b90156d7e123066882 --- /dev/null +++ b/graph/incidents_graphml/3/3cdc40d0-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.234 + 100.64.22.234 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3cdc40d0-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/3/3cdc7c30-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3cdc7c30-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0739fd02e13736e26ee11c47e9226aef60ac7297 --- /dev/null +++ b/graph/incidents_graphml/3/3cdc7c30-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.231 + 100.64.84.231 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Barracuda WAF","ASA Firewall"] + + + HOST + 100.64.92.202 + 100.64.92.202 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1662210395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cdc7c30-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3cdec620-2b89-11ed-80c0-adfe06f1feac.graphml b/graph/incidents_graphml/3/3cdec620-2b89-11ed-80c0-adfe06f1feac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..19f8aefa4c758bb1dd5bc9d771511e78cb7686d7 --- /dev/null +++ b/graph/incidents_graphml/3/3cdec620-2b89-11ed-80c0-adfe06f1feac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662210395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3cdec620-2b89-11ed-80c0-adfe06f1feac + + + diff --git a/graph/incidents_graphml/3/3cec8670-31f0-11ee-bb84-0df6679a1a3d.graphml b/graph/incidents_graphml/3/3cec8670-31f0-11ee-bb84-0df6679a1a3d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d0d04db6ce69c97b5a4ba6a3ee4eb4343ed97337 --- /dev/null +++ b/graph/incidents_graphml/3/3cec8670-31f0-11ee-bb84-0df6679a1a3d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.93 + 100.64.7.93 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691061838 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3cec8670-31f0-11ee-bb84-0df6679a1a3d + + + diff --git a/graph/incidents_graphml/3/3cedfb80-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/3/3cedfb80-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e9a976e97c89fed8399af24804231a0486443e3 --- /dev/null +++ b/graph/incidents_graphml/3/3cedfb80-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.233 + USER-0015-1231.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159250 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cedfb80-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159250 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cedfb80-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/3/3cf14420-fcb8-11ed-bdca-e96ab691d6d5.graphml b/graph/incidents_graphml/3/3cf14420-fcb8-11ed-bdca-e96ab691d6d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4afd86977a3c002f94cbec82174a3c9aa37b9b1b --- /dev/null +++ b/graph/incidents_graphml/3/3cf14420-fcb8-11ed-bdca-e96ab691d6d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.20.188 + 100.64.20.188 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685210374 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cf14420-fcb8-11ed-bdca-e96ab691d6d5 + + + diff --git a/graph/incidents_graphml/3/3cf80c50-fb83-11ed-b62e-59f6599c4691.graphml b/graph/incidents_graphml/3/3cf80c50-fb83-11ed-b62e-59f6599c4691.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2be6083b29c58fdf5b4bd3660e038b9652de60e9 --- /dev/null +++ b/graph/incidents_graphml/3/3cf80c50-fb83-11ed-b62e-59f6599c4691.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.41.16 + 100.64.41.16 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685077660 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cf80c50-fb83-11ed-b62e-59f6599c4691 + + + diff --git a/graph/incidents_graphml/3/3cfd0f40-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3cfd0f40-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4447492ff943aec187c4a73803434c1a8b978093 --- /dev/null +++ b/graph/incidents_graphml/3/3cfd0f40-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.234 + 100.64.22.234 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300901 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3cfd0f40-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/3/3d0bf750-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3d0bf750-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5f1a7d7c10873029ea82b41074ba17e99cb5404 --- /dev/null +++ b/graph/incidents_graphml/3/3d0bf750-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810485 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d0bf750-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3d0f8f70-6590-11ee-b6b8-b9a4d865fde2.graphml b/graph/incidents_graphml/3/3d0f8f70-6590-11ee-b6b8-b9a4d865fde2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..53b687d900b619cb1cae836d8c2e8ecd4238a616 --- /dev/null +++ b/graph/incidents_graphml/3/3d0f8f70-6590-11ee-b6b8-b9a4d865fde2.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.64 + 100.64.32.64 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.206 + 100.64.6.206 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.65 + 100.64.32.65 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.66 + 100.64.32.66 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.67 + 100.64.32.67 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.6 + 100.64.16.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.68 + 100.64.32.68 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.69 + 100.64.32.69 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.70 + 100.64.32.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.71 + 100.64.32.71 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.235 + 100.64.19.235 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.72 + 100.64.32.72 + ["Exploiting Host"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.73 + USER-0015-1292.example.internal + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.74 + 100.64.32.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.75 + 100.64.32.75 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.69 + 100.64.28.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.196 + 100.64.24.196 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.76 + 100.64.32.76 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.77 + 100.64.32.77 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + INCIDENT_LINK + 1696738066 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d0f8f70-6590-11ee-b6b8-b9a4d865fde2 + + + diff --git a/graph/incidents_graphml/3/3d1b1e90-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3d1b1e90-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fae9d62fdd16adf3e4294f39d24b4d680f80b980 --- /dev/null +++ b/graph/incidents_graphml/3/3d1b1e90-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.236 + 100.64.22.236 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300901 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d1b1e90-21ec-11ee-86db-6b99d218dc75 + + + diff --git a/graph/incidents_graphml/3/3d1cc6e0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d1cc6e0-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8482ec1358f3b0bcedde61890349bc700469ca4a --- /dev/null +++ b/graph/incidents_graphml/3/3d1cc6e0-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.117 + 100.64.13.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3d1cc6e0-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3d1daa90-5408-11ee-b5a3-f722d9347af6.graphml b/graph/incidents_graphml/3/3d1daa90-5408-11ee-b5a3-f722d9347af6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4402689101af23fe55a1f129fe706e5b69ca9668 --- /dev/null +++ b/graph/incidents_graphml/3/3d1daa90-5408-11ee-b5a3-f722d9347af6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694810485 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3d1daa90-5408-11ee-b5a3-f722d9347af6 + + + diff --git a/graph/incidents_graphml/3/3d290130-f92f-11ed-ab43-ff746e796bda.graphml b/graph/incidents_graphml/3/3d290130-f92f-11ed-ab43-ff746e796bda.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d9280fe23bd9c04f2e4cfc81a8eadce865f25629 --- /dev/null +++ b/graph/incidents_graphml/3/3d290130-f92f-11ed-ab43-ff746e796bda.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.91 + 100.64.10.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1684821680 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d290130-f92f-11ed-ab43-ff746e796bda + + + diff --git a/graph/incidents_graphml/3/3d34a6a0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3d34a6a0-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdc3a83627417695ff64c6cdd2b82f71b111e47c --- /dev/null +++ b/graph/incidents_graphml/3/3d34a6a0-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.22 + 100.64.57.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597088 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d34a6a0-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3d4305d0-249e-11ef-8629-fb371c38e19d.graphml b/graph/incidents_graphml/3/3d4305d0-249e-11ef-8629-fb371c38e19d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..88a3df0808023dc2201acf045cbe728e948cfd24 --- /dev/null +++ b/graph/incidents_graphml/3/3d4305d0-249e-11ef-8629-fb371c38e19d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.120 + 100.64.56.120 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717744752 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3d4305d0-249e-11ef-8629-fb371c38e19d + + + diff --git a/graph/incidents_graphml/3/3d4a2030-3fc5-11ef-8c1a-53987decb6d6.graphml b/graph/incidents_graphml/3/3d4a2030-3fc5-11ef-8c1a-53987decb6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3280ea1218297d2efd677dce7aadc7fcd75f1c4e --- /dev/null +++ b/graph/incidents_graphml/3/3d4a2030-3fc5-11ef-8c1a-53987decb6d6.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.213 + 100.64.42.213 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.9.30.149 + 10.9.30.149 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720730184 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d4a2030-3fc5-11ef-8c1a-53987decb6d6 + + + INCIDENT_LINK + 1720730184 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d4a2030-3fc5-11ef-8c1a-53987decb6d6 + + + diff --git a/graph/incidents_graphml/3/3d5f8730-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3d5f8730-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0577f03da724201a0c09f3a0ab143a2d8f9f581a --- /dev/null +++ b/graph/incidents_graphml/3/3d5f8730-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.22 + 100.64.57.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597088 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3d5f8730-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3d613b80-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3d613b80-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7a46585318cc8ff27aa3bd557de6ff9583057bf --- /dev/null +++ b/graph/incidents_graphml/3/3d613b80-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,151 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.26 + 100.64.81.26 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.88 + 100.64.72.88 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.36.139 + 100.64.36.139 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + 100.64.72.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199028 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d613b80-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/3d62e930-fdf5-11ec-a66d-037b7a1a7f6a.graphml b/graph/incidents_graphml/3/3d62e930-fdf5-11ec-a66d-037b7a1a7f6a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e8e9eefdec282673a4817bd095ce21d3d825bde7 --- /dev/null +++ b/graph/incidents_graphml/3/3d62e930-fdf5-11ec-a66d-037b7a1a7f6a.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.25 + 100.64.20.25 + ["Exploiting Host"] + 0.8875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.60 + 100.64.73.60 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.111 + 100.64.80.111 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657199028 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a + + + INCIDENT_LINK + 1657199028 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d62e930-fdf5-11ec-a66d-037b7a1a7f6a + + + diff --git a/graph/incidents_graphml/3/3d62ff60-3fc5-11ef-8c1a-53987decb6d6.graphml b/graph/incidents_graphml/3/3d62ff60-3fc5-11ef-8c1a-53987decb6d6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68f8663dd7b6492e09e7e05effcc2e687af42e2d --- /dev/null +++ b/graph/incidents_graphml/3/3d62ff60-3fc5-11ef-8c1a-53987decb6d6.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.214 + 100.64.42.214 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720730184 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d62ff60-3fc5-11ef-8c1a-53987decb6d6 + + + diff --git a/graph/incidents_graphml/3/3d65ddd0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d65ddd0-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b5ecb2a99b933887df68e0734e21217ce152ea5 --- /dev/null +++ b/graph/incidents_graphml/3/3d65ddd0-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.119 + 100.64.13.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d65ddd0-2b9d-11ee-a75c-6705ed43e196 + + + INCIDENT_LINK + 1690366483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d65ddd0-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3d7730d0-0e2e-11ee-bc7f-2529405b1969.graphml b/graph/incidents_graphml/3/3d7730d0-0e2e-11ee-bc7f-2529405b1969.graphml new file mode 100644 index 0000000000000000000000000000000000000000..120024a7305ab6427f7525296832122903f56408 --- /dev/null +++ b/graph/incidents_graphml/3/3d7730d0-0e2e-11ee-bc7f-2529405b1969.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.211 + 100.64.8.211 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.218 + 100.64.71.218 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687130225 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d7730d0-0e2e-11ee-bc7f-2529405b1969 + + + INCIDENT_LINK + 1687130225 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d7730d0-0e2e-11ee-bc7f-2529405b1969 + + + diff --git a/graph/incidents_graphml/3/3d7a7740-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d7a7740-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1de60fc0236e7860ff9c2a1ee6469fec044e1f2 --- /dev/null +++ b/graph/incidents_graphml/3/3d7a7740-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.119 + 100.64.13.119 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3d7a7740-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3d873dc0-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/3/3d873dc0-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f0763a83fdbba55c44fd7c285329c71c7662196 --- /dev/null +++ b/graph/incidents_graphml/3/3d873dc0-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.50.224 + 100.64.50.224 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671662 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3d873dc0-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/3/3d87e5c0-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3d87e5c0-0482-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a8695eac08cfa78fab58a5efe85f1146e3f7af67 --- /dev/null +++ b/graph/incidents_graphml/3/3d87e5c0-0482-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.19.5 + 100.64.19.5 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686066792 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3d87e5c0-0482-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3d899f40-43ac-11ef-a622-2be670a61274.graphml b/graph/incidents_graphml/3/3d899f40-43ac-11ef-a622-2be670a61274.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8abe877b8b92ed7c38a9b039f9a88c3c871d85d --- /dev/null +++ b/graph/incidents_graphml/3/3d899f40-43ac-11ef-a622-2be670a61274.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.62 + USER-0015-1313.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.239 + 100.64.37.239 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1721159251 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d899f40-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159251 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d899f40-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159251 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d899f40-43ac-11ef-a622-2be670a61274 + + + INCIDENT_LINK + 1721159251 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d899f40-43ac-11ef-a622-2be670a61274 + + + diff --git a/graph/incidents_graphml/3/3d8b61a0-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/3d8b61a0-294d-11ef-a020-fd333ff9534c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66393e7fb8e7aafe9255c60fd0d569f653414332 --- /dev/null +++ b/graph/incidents_graphml/3/3d8b61a0-294d-11ef-a020-fd333ff9534c.graphml @@ -0,0 +1,769 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.205 + 100.64.65.205 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.70 + 100.64.60.70 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.66 + 100.64.24.66 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target"] + 0.68359375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.143 + 100.64.37.143 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.60.69 + 100.64.60.69 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.210 + 100.64.44.210 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.206 + 100.64.65.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.207 + 100.64.65.207 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.208 + 100.64.65.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.209 + 100.64.65.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.210 + 100.64.65.210 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.74 + 100.64.8.74 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.211 + 100.64.65.211 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.212 + 100.64.65.212 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.213 + 100.64.65.213 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.214 + 100.64.65.214 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.215 + 100.64.65.215 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d8b61a0-294d-11ef-a020-fd333ff9534c + + + diff --git a/graph/incidents_graphml/3/3d91f6e0-2b9d-11ee-a75c-6705ed43e196.graphml b/graph/incidents_graphml/3/3d91f6e0-2b9d-11ee-a75c-6705ed43e196.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51cead2b368bd97b31c93181cae66ee682dc7670 --- /dev/null +++ b/graph/incidents_graphml/3/3d91f6e0-2b9d-11ee-a75c-6705ed43e196.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.153 + 100.64.6.153 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690366483 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 3d91f6e0-2b9d-11ee-a75c-6705ed43e196 + + + diff --git a/graph/incidents_graphml/3/3d94a0f0-126d-11ee-9cb5-514a509424ae.graphml b/graph/incidents_graphml/3/3d94a0f0-126d-11ee-9cb5-514a509424ae.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df225a75833a81ad489e31a0f25507fd28d4b3ef --- /dev/null +++ b/graph/incidents_graphml/3/3d94a0f0-126d-11ee-9cb5-514a509424ae.graphml @@ -0,0 +1,683 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.57.24 + 100.64.57.24 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.250 + 100.64.17.250 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.103 + 100.64.28.103 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.19 + 100.64.11.19 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.45 + 100.64.39.45 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.25 + 100.64.57.25 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.136 + 100.64.4.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.26 + 100.64.57.26 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.97 + 100.64.25.97 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.27 + 100.64.57.27 + ["Exploiting Host","Exploiting Target"] + 0.7525 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.28 + 100.64.57.28 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.121 + 100.64.43.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.29 + 100.64.57.29 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.187 + 100.64.33.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.30 + 100.64.57.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.211 + 100.64.45.211 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.114 + 100.64.22.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + INCIDENT_LINK + 1687597089 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d94a0f0-126d-11ee-9cb5-514a509424ae + + + diff --git a/graph/incidents_graphml/3/3d96ce20-7726-11ee-af8e-272b0e07eabf.graphml b/graph/incidents_graphml/3/3d96ce20-7726-11ee-af8e-272b0e07eabf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd6f9c7d7b91bdff9f43f403cb2266a873d83e21 --- /dev/null +++ b/graph/incidents_graphml/3/3d96ce20-7726-11ee-af8e-272b0e07eabf.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.50.224 + 100.64.50.224 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698671662 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 3d96ce20-7726-11ee-af8e-272b0e07eabf + + + diff --git a/graph/incidents_graphml/3/3d988100-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/3d988100-294d-11ef-a020-fd333ff9534c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ebc7f564d0a3521e5a0ae2c8df375c69b298973 --- /dev/null +++ b/graph/incidents_graphml/3/3d988100-294d-11ef-a020-fd333ff9534c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.227 + 100.64.65.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.30 + 100.64.49.30 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.195 + 100.64.31.195 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718259719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d988100-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d988100-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d988100-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d988100-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d988100-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d988100-294d-11ef-a020-fd333ff9534c + + + diff --git a/graph/incidents_graphml/3/3d9a3540-0482-11ee-9300-094b5588de47.graphml b/graph/incidents_graphml/3/3d9a3540-0482-11ee-9300-094b5588de47.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9270f5f04d25f68d867bfc79031bffefd0b2a33 --- /dev/null +++ b/graph/incidents_graphml/3/3d9a3540-0482-11ee-9300-094b5588de47.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.195 + 100.64.22.195 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","PAN NGFW"] + + + INCIDENT_LINK + 1686066792 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3d9a3540-0482-11ee-9300-094b5588de47 + + + diff --git a/graph/incidents_graphml/3/3da7c340-294d-11ef-a020-fd333ff9534c.graphml b/graph/incidents_graphml/3/3da7c340-294d-11ef-a020-fd333ff9534c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cb9462165cc99ceda4ca93c9b448e1b6a22e6f9 --- /dev/null +++ b/graph/incidents_graphml/3/3da7c340-294d-11ef-a020-fd333ff9534c.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.245 + 100.64.37.245 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.138 + 100.64.40.138 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.231 + 100.64.65.231 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718259719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3da7c340-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3da7c340-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3da7c340-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3da7c340-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3da7c340-294d-11ef-a020-fd333ff9534c + + + INCIDENT_LINK + 1718259719 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 3da7c340-294d-11ef-a020-fd333ff9534c + + + diff --git a/graph/incidents_graphml/3/3da84360-21ec-11ee-86db-6b99d218dc75.graphml b/graph/incidents_graphml/3/3da84360-21ec-11ee-86db-6b99d218dc75.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc97ad0a83b8e54561f91049493512cc6b976c6f --- /dev/null +++ b/graph/incidents_graphml/3/3da84360-21ec-11ee-86db-6b99d218dc75.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.207 + USER-0015-1237.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689300902 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 3da84360-21ec-11ee-86db-6b99d218dc75 + + +