diff --git a/graph/incidents_graphml/9/96150540-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96150540-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dc466f2dc8bde7edb6831cb19e20c6d660ab1d9
--- /dev/null
+++ b/graph/incidents_graphml/9/96150540-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.51
+ 100.64.40.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348427
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96150540-1942-11ee-b83b-5979e1f254c2
+
+
+ INCIDENT_LINK
+ 1688348427
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96150540-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/96171770-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/96171770-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..45f0801ecb41d0cbcad55df8b3252032aedac34b
--- /dev/null
+++ b/graph/incidents_graphml/9/96171770-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.244
+ USER-0015-1972.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96171770-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/96175dc0-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/96175dc0-2816-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5518ee52364478b93ef8142077b5b042107d0680
--- /dev/null
+++ b/graph/incidents_graphml/9/96175dc0-2816-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.165
+ 100.64.30.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718126294
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96175dc0-2816-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/9/961ea510-c054-11ed-96c1-674c48144fee.graphml b/graph/incidents_graphml/9/961ea510-c054-11ed-96c1-674c48144fee.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c2646ed562acf6f36745c0a580f210ac16586e1
--- /dev/null
+++ b/graph/incidents_graphml/9/961ea510-c054-11ed-96c1-674c48144fee.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.238
+ 100.64.69.238
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"]
+
+
+ INCIDENT_LINK
+ 1678570504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1486","T1041","T1567"]
+ ["TA0001","TA0002","TA0040","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"]
+ complete-mission
+ Unprocessed
+ 961ea510-c054-11ed-96c1-674c48144fee
+
+
+
diff --git a/graph/incidents_graphml/9/96200570-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/96200570-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..509001263e44728ec35f97a7e2fabd5a3a04061c
--- /dev/null
+++ b/graph/incidents_graphml/9/96200570-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,791 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.176
+ 100.64.5.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.202
+ 100.64.11.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.23
+ 100.64.13.23
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.24
+ 100.64.13.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.12
+ 100.64.2.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.115
+ 100.64.4.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.25
+ 100.64.13.25
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.26
+ 100.64.13.26
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.27
+ 100.64.13.27
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.28
+ 100.64.13.28
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.29
+ 100.64.13.29
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.235
+ 100.64.10.235
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.42
+ 100.64.13.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.43
+ 100.64.13.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.44
+ 100.64.13.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.45
+ 100.64.13.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.13.46
+ 100.64.13.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+ INCIDENT_LINK
+ 1712372756
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96200570-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/96230380-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96230380-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a580a00fde472ab30343a8f6c1e97ea1f57f60e9
--- /dev/null
+++ b/graph/incidents_graphml/9/96230380-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.22
+ USER-0015-1296.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96230380-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/96264240-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/96264240-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..50c387d6cb10d3e08910c9b4c2c4beea29bcde54
--- /dev/null
+++ b/graph/incidents_graphml/9/96264240-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.106
+ 100.64.76.106
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714739
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96264240-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/96291100-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/96291100-2816-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce3cd006973fc9d49608278c99e2e254a3147b10
--- /dev/null
+++ b/graph/incidents_graphml/9/96291100-2816-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.165
+ 100.64.30.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718126294
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96291100-2816-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/9/962aaed0-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/962aaed0-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc4843b1d43b7a3759a699d4c0824c0dc59849b7
--- /dev/null
+++ b/graph/incidents_graphml/9/962aaed0-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.46
+ 100.64.30.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517330
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 962aaed0-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/962b14a0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/962b14a0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..89d3abf257facd838748e117ee6fac098313ada2
--- /dev/null
+++ b/graph/incidents_graphml/9/962b14a0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.85.244
+ USER-0015-1972.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 962b14a0-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13a596528709a54a6c64ee4824be471f40465f72
--- /dev/null
+++ b/graph/incidents_graphml/9/962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.185
+ USER-0015-1773.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657051000
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/962ea7c0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/962ea7c0-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..006caabd36ec4dc5ea26279b1e0676e13cfcdf20
--- /dev/null
+++ b/graph/incidents_graphml/9/962ea7c0-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.51
+ 100.64.40.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348427
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 962ea7c0-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/9637f580-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/9637f580-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96caa915522b29b79db4eb9ad386f7ce0918c902
--- /dev/null
+++ b/graph/incidents_graphml/9/9637f580-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.106
+ 100.64.76.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714739
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9637f580-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/9639c970-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/9639c970-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..383e7e681196426c1b8c0454b30d68a637d02bbf
--- /dev/null
+++ b/graph/incidents_graphml/9/9639c970-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.249
+ USER-0015-1774.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657051000
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9639c970-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/963af320-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/963af320-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ccb46b6c3c6638aa1395acf3e325bf94a91913f0
--- /dev/null
+++ b/graph/incidents_graphml/9/963af320-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.23
+ 100.64.54.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 963af320-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/963b9ec0-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/963b9ec0-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5ea551eb863307be51b6880485d2d7e5e6113e1
--- /dev/null
+++ b/graph/incidents_graphml/9/963b9ec0-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.46
+ 100.64.30.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517330
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 963b9ec0-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/963d13e0-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/963d13e0-6fab-11ee-8e98-1955c57dee13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d87e4b4beef3fa64c11adb75f6f6cac6ea9f93cc
--- /dev/null
+++ b/graph/incidents_graphml/9/963d13e0-6fab-11ee-8e98-1955c57dee13.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697849324
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 963d13e0-6fab-11ee-8e98-1955c57dee13
+
+
+
diff --git a/graph/incidents_graphml/9/9642f310-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/9642f310-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fa5b9a96eeb6e800e6f411211de2e8aa5020817
--- /dev/null
+++ b/graph/incidents_graphml/9/9642f310-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.69
+ 100.64.49.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348427
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9642f310-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/964736f0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/964736f0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d654be8122a79573ace0338fb4582733f8066bf9
--- /dev/null
+++ b/graph/incidents_graphml/9/964736f0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.249
+ USER-0015-1774.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657051000
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 964736f0-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/9649bf50-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/9649bf50-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bcd635e7e7c619953e8a2016352f0a567d529dc
--- /dev/null
+++ b/graph/incidents_graphml/9/9649bf50-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.184
+ 100.64.52.184
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971003
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9649bf50-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/964b6bc0-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/964b6bc0-6fab-11ee-8e98-1955c57dee13.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cedcb6c80ce5afb13a62b4c913a539eb105b9052
--- /dev/null
+++ b/graph/incidents_graphml/9/964b6bc0-6fab-11ee-8e98-1955c57dee13.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.30
+ 100.64.6.30
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697849324
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 964b6bc0-6fab-11ee-8e98-1955c57dee13
+
+
+
diff --git a/graph/incidents_graphml/9/9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..61a92b29b59f9e8f21f3b888781f68114b850650
--- /dev/null
+++ b/graph/incidents_graphml/9/9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.71
+ 100.64.78.71
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.78.72
+ 100.64.78.72
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657051000
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051000
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/965272c0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/965272c0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d736b249163b33ecb0ac3771101ee21017ae20c
--- /dev/null
+++ b/graph/incidents_graphml/9/965272c0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.54.23
+ 100.64.54.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 965272c0-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/9652bc50-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/9652bc50-5560-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da23031b841407c958c3d20727bec189d646370b
--- /dev/null
+++ b/graph/incidents_graphml/9/9652bc50-5560-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.217
+ 100.64.18.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.213
+ 100.64.20.213
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.180
+ 100.64.35.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.55
+ USER-0015-1347.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.254
+ 100.64.10.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.69
+ 100.64.45.69
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.43
+ 100.64.14.43
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958382
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/9/96586550-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/96586550-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a6e9794e387e3a12a7a2d7d4498aaa149620fcf
--- /dev/null
+++ b/graph/incidents_graphml/9/96586550-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.184
+ 100.64.52.184
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971004
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96586550-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/96623ae0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96623ae0-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..922f04bbd7fcc5ac90ae75012f229653ca90d790
--- /dev/null
+++ b/graph/incidents_graphml/9/96623ae0-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.69
+ 100.64.49.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348427
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96623ae0-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/96666ff0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/96666ff0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..991dd39543e8b671597543953f36ff2ed78748be
--- /dev/null
+++ b/graph/incidents_graphml/9/96666ff0-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.245
+ USER-0015-1973.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96666ff0-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96666ff0-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/9669a360-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/9669a360-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fd35777dd9c963cb7a9a315aeb01f5f0a7057e9
--- /dev/null
+++ b/graph/incidents_graphml/9/9669a360-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.185
+ 100.64.52.185
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971004
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9669a360-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae22d7b0d4ff9c8209ad2fa6aaa5c1f390b812f2
--- /dev/null
+++ b/graph/incidents_graphml/9/966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.78
+ USER-0015-1775.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1657051001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7877b7fe8dfd039a60399e0f80a9c6e9658ff644
--- /dev/null
+++ b/graph/incidents_graphml/9/9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.78
+ USER-0015-1775.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657051001
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/967f0100-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/967f0100-ab16-11ee-ace1-1bcda4a2f9d1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9016f0deb2ed6810dc2585fba6de3f7557a4811a
--- /dev/null
+++ b/graph/incidents_graphml/9/967f0100-ab16-11ee-ace1-1bcda4a2f9d1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 192.168.5.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.85.245
+ USER-0015-1973.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1704382399
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 967f0100-ab16-11ee-ace1-1bcda4a2f9d1
+
+
+
diff --git a/graph/incidents_graphml/9/969001a0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/969001a0-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5cdb835aa6d1c85ea01325696d95c61cd00f62b
--- /dev/null
+++ b/graph/incidents_graphml/9/969001a0-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.71
+ USER-0015-1380.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348428
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 969001a0-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/96a5ec20-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/96a5ec20-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4cf33783a1354a081bf9f7f83535f13a67fa846c
--- /dev/null
+++ b/graph/incidents_graphml/9/96a5ec20-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.250
+ 100.64.36.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96a5ec20-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/96a6fd00-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/96a6fd00-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9de6e680c31495263843be9787c35989f545e57c
--- /dev/null
+++ b/graph/incidents_graphml/9/96a6fd00-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.236
+ 100.64.9.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972459
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96a6fd00-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/96a9cb30-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96a9cb30-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4a69dcd4eea81cd033e545ac2e9e5b65d04c1d2
--- /dev/null
+++ b/graph/incidents_graphml/9/96a9cb30-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348428
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96a9cb30-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/96b66650-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/96b66650-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..09e8fa2db7c07efb30519021b12338e2f7e6b0f2
--- /dev/null
+++ b/graph/incidents_graphml/9/96b66650-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.236
+ 100.64.9.236
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972459
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96b66650-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/96c0f130-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96c0f130-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f0d2ff485ca9097bce7883f55a4efb40bee8aae
--- /dev/null
+++ b/graph/incidents_graphml/9/96c0f130-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.152
+ 100.64.11.152
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96c0f130-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/96c42320-3a82-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/96c42320-3a82-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8fa87e19acaae31a5ec6096d8b7b058de1e06ab5
--- /dev/null
+++ b/graph/incidents_graphml/9/96c42320-3a82-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.224
+ 100.64.32.224
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.68.87
+ 100.64.68.87
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692004304
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96c42320-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004304
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96c42320-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004304
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96c42320-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004304
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96c42320-3a82-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/9/96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/9/96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..af6c1d648a54e88479ef0ee2ca5b30f73308a2d9
--- /dev/null
+++ b/graph/incidents_graphml/9/96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.21
+ 100.64.71.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.28.219
+ 100.64.28.219
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.166
+ 100.64.80.166
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688490162
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490162
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490162
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+ INCIDENT_LINK
+ 1688490162
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4
+
+
+
diff --git a/graph/incidents_graphml/9/96d23ac0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96d23ac0-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..da94d89242ced79d82e894e69d83bf092fea8320
--- /dev/null
+++ b/graph/incidents_graphml/9/96d23ac0-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348428
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96d23ac0-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/96dfce00-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/96dfce00-e2e2-11ee-b0e0-350848617e5b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1dd45167bb3cda97f9fb24c21c0e147d7f9bdf98
--- /dev/null
+++ b/graph/incidents_graphml/9/96dfce00-e2e2-11ee-b0e0-350848617e5b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.48
+ 100.64.30.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710517331
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 96dfce00-e2e2-11ee-b0e0-350848617e5b
+
+
+
diff --git a/graph/incidents_graphml/9/96e21830-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/96e21830-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72a4c3a9401ab93bfc06d992e89a8d828bf7f9a6
--- /dev/null
+++ b/graph/incidents_graphml/9/96e21830-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.176
+ 100.64.71.176
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e21830-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/96e67a20-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/9/96e67a20-70e6-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20e2120b980143626c05d6ac4d1cf7244a8137ee
--- /dev/null
+++ b/graph/incidents_graphml/9/96e67a20-70e6-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.79
+ 100.64.68.79
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1697984617
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e67a20-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984617
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e67a20-70e6-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/9/96e9a8d0-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/96e9a8d0-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9733bf106593a166ba0e3311e4f788792356ba1f
--- /dev/null
+++ b/graph/incidents_graphml/9/96e9a8d0-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.187
+ 100.64.52.187
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971004
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96e9a8d0-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/96e9b100-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/9/96e9b100-2c8a-11ed-be76-c750f0345c87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9c63ca41275f3f68e537870503c5d0ba891126bb
--- /dev/null
+++ b/graph/incidents_graphml/9/96e9b100-2c8a-11ed-be76-c750f0345c87.graphml
@@ -0,0 +1,207 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.88134765625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.137
+ 100.64.74.137
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.220
+ 100.64.72.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.74
+ 100.64.75.74
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.180
+ 100.64.71.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.26.179
+ USER-0015-1712.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320926
+ malicious
+ 0.88134765625
+ 0.88134765625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96e9b100-2c8a-11ed-be76-c750f0345c87
+
+
+
diff --git a/graph/incidents_graphml/9/96e9d5f0-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96e9d5f0-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b59aeeb7a02026a7a1388a6a2db288a925a0c046
--- /dev/null
+++ b/graph/incidents_graphml/9/96e9d5f0-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.116
+ 100.64.41.116
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000106
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96e9d5f0-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/96f11ef0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/96f11ef0-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f31990205a77f594f7d0cb158caf131fd622a052
--- /dev/null
+++ b/graph/incidents_graphml/9/96f11ef0-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.194
+ 100.64.38.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389528
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96f11ef0-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/96f2f8d0-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/96f2f8d0-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9d3afd1200f5e8b703d96481478c98367a4838f0
--- /dev/null
+++ b/graph/incidents_graphml/9/96f2f8d0-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.52
+ 100.64.52.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 100.64.84.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1671749239
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96f2f8d0-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/96f5a710-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/96f5a710-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6cdcd0917abfce5a64b174f5ca20a72bee3c04c5
--- /dev/null
+++ b/graph/incidents_graphml/9/96f5a710-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.8
+ 100.64.30.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 96f5a710-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/96f7b290-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/96f7b290-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4ab5e2c138f1ca4147a9a86d2330a0d75213b02
--- /dev/null
+++ b/graph/incidents_graphml/9/96f7b290-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.189
+ 100.64.52.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 96f7b290-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/96f89e20-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/96f89e20-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..dfed49b77057a17386c6a65f6d723d196b420e63
--- /dev/null
+++ b/graph/incidents_graphml/9/96f89e20-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ 100.64.84.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.52.52
+ 100.64.52.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1671749239
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 96f89e20-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/9705bc50-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/9705bc50-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b82d03bfc4df76d02b19e13d65c4bc89d65ef467
--- /dev/null
+++ b/graph/incidents_graphml/9/9705bc50-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.189
+ 100.64.52.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9705bc50-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/9707a870-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/9707a870-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08d9e7e4a62a6e83e44aeea325e01483bfa31e78
--- /dev/null
+++ b/graph/incidents_graphml/9/9707a870-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.8
+ 100.64.30.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9707a870-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/970d8790-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/970d8790-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4dd439320ad367d6c9db2c3f16273d0f078df7b5
--- /dev/null
+++ b/graph/incidents_graphml/9/970d8790-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.187
+ 100.64.45.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 970d8790-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/97109fe0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/9/97109fe0-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1403bd342e228477f04c090c58bb7d3233f18570
--- /dev/null
+++ b/graph/incidents_graphml/9/97109fe0-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.238
+ 100.64.12.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025613
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97109fe0-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/9/97140480-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97140480-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a19eca50815d76f9e1c96fdef8b7d10eeb97769
--- /dev/null
+++ b/graph/incidents_graphml/9/97140480-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.10
+ 100.64.30.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97140480-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/971e5070-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/971e5070-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c019f90d65c679db1dd7c3bdc0104ca6643b016b
--- /dev/null
+++ b/graph/incidents_graphml/9/971e5070-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.187
+ 100.64.45.187
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 971e5070-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/971f9770-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/971f9770-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..956045f0c4988fa8b3fd3b71a04cfb945a61c9a3
--- /dev/null
+++ b/graph/incidents_graphml/9/971f9770-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.41.204
+ 100.64.41.204
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348429
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 971f9770-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/9720d5c0-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/9720d5c0-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7336a60a9b3765fad1d215157c327584f62a942c
--- /dev/null
+++ b/graph/incidents_graphml/9/9720d5c0-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.10
+ 100.64.30.10
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115350
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9720d5c0-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/9723e040-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/9723e040-1804-11ed-8708-35bec77a7d27.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d87ea915f57a6e38d69be7daa792cc92ce8831f
--- /dev/null
+++ b/graph/incidents_graphml/9/9723e040-1804-11ed-8708-35bec77a7d27.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.101
+ 100.64.69.101
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.220
+ 100.64.73.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.221
+ 100.64.73.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.222
+ 100.64.73.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.181
+ 100.64.71.181
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.223
+ 100.64.73.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.224
+ 100.64.73.224
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.18.2
+ 100.64.18.2
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+ INCIDENT_LINK
+ 1660064351
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9723e040-1804-11ed-8708-35bec77a7d27
+
+
+
diff --git a/graph/incidents_graphml/9/97249440-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/97249440-ffe3-11ee-b8be-512e5047d566.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..31da20f1cd87acc2d4f55686dca8d9985b8f9c00
--- /dev/null
+++ b/graph/incidents_graphml/9/97249440-ffe3-11ee-b8be-512e5047d566.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.60
+ 100.64.26.60
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713706345
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97249440-ffe3-11ee-b8be-512e5047d566
+
+
+
diff --git a/graph/incidents_graphml/9/9728adc0-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/9728adc0-7c1f-11ee-8eb9-57773318f728.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..99013dba28066e83fb4e80240819fecec025a0ed
--- /dev/null
+++ b/graph/incidents_graphml/9/9728adc0-7c1f-11ee-8eb9-57773318f728.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.217
+ 100.64.24.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699218561
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9728adc0-7c1f-11ee-8eb9-57773318f728
+
+
+
diff --git a/graph/incidents_graphml/9/972cd740-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/972cd740-0da4-11ee-89a8-99e55fee7bce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..344cc829af114e9c81ba0a0c4ae59014dd5509ef
--- /dev/null
+++ b/graph/incidents_graphml/9/972cd740-0da4-11ee-89a8-99e55fee7bce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.205
+ 100.64.35.205
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687071105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 972cd740-0da4-11ee-89a8-99e55fee7bce
+
+
+
diff --git a/graph/incidents_graphml/9/972ce3b0-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/972ce3b0-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a62fa5b6056a0a7f1d4f670758bccd806ad7ecbd
--- /dev/null
+++ b/graph/incidents_graphml/9/972ce3b0-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.51
+ 100.64.19.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115350
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 972ce3b0-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/972d1d80-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/972d1d80-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a538ce5897282db7c2ee2ceabaa802b72195eb24
--- /dev/null
+++ b/graph/incidents_graphml/9/972d1d80-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 972d1d80-77e0-11ee-9673-bb6a5cba9414
+
+
+ INCIDENT_LINK
+ 1698751698
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 972d1d80-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/97305ce0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/9/97305ce0-2883-11ee-92b9-d3cce1c86342.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c8d93b2f99dbec9aaae126a9f81781a6fcfb530
--- /dev/null
+++ b/graph/incidents_graphml/9/97305ce0-2883-11ee-92b9-d3cce1c86342.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.238
+ 100.64.12.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690025613
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97305ce0-2883-11ee-92b9-d3cce1c86342
+
+
+
diff --git a/graph/incidents_graphml/9/97366940-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/97366940-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..894aba31d37d3dade3c76701d54bc66705c499f4
--- /dev/null
+++ b/graph/incidents_graphml/9/97366940-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.116
+ 100.64.24.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971005
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97366940-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/97388c40-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/97388c40-7c1f-11ee-8eb9-57773318f728.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..46f95ee065c3547c29fc3f9753e03ea37bc53a23
--- /dev/null
+++ b/graph/incidents_graphml/9/97388c40-7c1f-11ee-8eb9-57773318f728.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.217
+ 100.64.24.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699218561
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97388c40-7c1f-11ee-8eb9-57773318f728
+
+
+
diff --git a/graph/incidents_graphml/9/9738b880-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/9738b880-ffe3-11ee-b8be-512e5047d566.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..52487d64488dd083be212c1e7e41e160b3b4ea88
--- /dev/null
+++ b/graph/incidents_graphml/9/9738b880-ffe3-11ee-b8be-512e5047d566.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.60
+ 100.64.26.60
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713706345
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9738b880-ffe3-11ee-b8be-512e5047d566
+
+
+
diff --git a/graph/incidents_graphml/9/973bb0c0-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/973bb0c0-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43d2a51e402dcc8fea964dbe718a1a9e67df0de6
--- /dev/null
+++ b/graph/incidents_graphml/9/973bb0c0-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.51
+ 100.64.19.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 973bb0c0-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/973bc680-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/973bc680-1617-11ee-87fd-95133fbba576.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d77b8bf54df2013838aa8e7625e902eba0532891
--- /dev/null
+++ b/graph/incidents_graphml/9/973bc680-1617-11ee-87fd-95133fbba576.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.128
+ 100.64.28.128
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688000107
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 973bc680-1617-11ee-87fd-95133fbba576
+
+
+
diff --git a/graph/incidents_graphml/9/973e5b90-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/973e5b90-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb58d642da0fed6ff4d87646d1721a1c7d71a139
--- /dev/null
+++ b/graph/incidents_graphml/9/973e5b90-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.22
+ 100.64.21.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751698
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 973e5b90-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/974143a0-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/9/974143a0-216e-11ee-9e0b-8dcc0a578b7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f5d228792fcaece9eed2fab0a07360809fba7882
--- /dev/null
+++ b/graph/incidents_graphml/9/974143a0-216e-11ee-9e0b-8dcc0a578b7b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.99
+ 100.64.11.99
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689246936
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 974143a0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246936
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 974143a0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246936
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 974143a0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+ INCIDENT_LINK
+ 1689246936
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 974143a0-216e-11ee-9e0b-8dcc0a578b7b
+
+
+
diff --git a/graph/incidents_graphml/9/9742afd0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/9742afd0-1942-11ee-b83b-5979e1f254c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea096d2084e19f6f8acafbe52b6904df1cdc135b
--- /dev/null
+++ b/graph/incidents_graphml/9/9742afd0-1942-11ee-b83b-5979e1f254c2.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.73
+ 100.64.49.73
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688348429
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9742afd0-1942-11ee-b83b-5979e1f254c2
+
+
+
diff --git a/graph/incidents_graphml/9/97474980-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97474980-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ecdd330136acc28937453104228aede9705b2dcc
--- /dev/null
+++ b/graph/incidents_graphml/9/97474980-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.74
+ 100.64.10.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115351
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97474980-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/974a6470-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/9/974a6470-93b6-11ee-ad07-e3190f846a2a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe13f7b508b28d8810f1887cad02a390f1aa31dd
--- /dev/null
+++ b/graph/incidents_graphml/9/974a6470-93b6-11ee-ad07-e3190f846a2a.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.79
+ 100.64.69.79
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1701812292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 974a6470-93b6-11ee-ad07-e3190f846a2a
+
+
+ INCIDENT_LINK
+ 1701812292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 974a6470-93b6-11ee-ad07-e3190f846a2a
+
+
+
diff --git a/graph/incidents_graphml/9/974a92d0-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/974a92d0-ffe3-11ee-b8be-512e5047d566.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fe101398591c0eab6318123f2fbf37042066675b
--- /dev/null
+++ b/graph/incidents_graphml/9/974a92d0-ffe3-11ee-b8be-512e5047d566.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.32
+ 100.64.22.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713706345
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 974a92d0-ffe3-11ee-b8be-512e5047d566
+
+
+
diff --git a/graph/incidents_graphml/9/974d73d0-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/974d73d0-7c1f-11ee-8eb9-57773318f728.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..22b397661d0c4f9441de5da484ca55795db5173b
--- /dev/null
+++ b/graph/incidents_graphml/9/974d73d0-7c1f-11ee-8eb9-57773318f728.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.162
+ 100.64.3.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1699218562
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 974d73d0-7c1f-11ee-8eb9-57773318f728
+
+
+
diff --git a/graph/incidents_graphml/9/974e0ff0-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/974e0ff0-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4ba20189ac83351628ffd139d669d678c19338a1
--- /dev/null
+++ b/graph/incidents_graphml/9/974e0ff0-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.116
+ 100.64.24.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971005
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 974e0ff0-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/97505cf0-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/97505cf0-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e1ae57901314060e5ec135cdf076a6b977849d2e
--- /dev/null
+++ b/graph/incidents_graphml/9/97505cf0-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.38
+ 100.64.21.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 97505cf0-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/975067a0-5161-11ed-8537-055dd7dfd795.graphml b/graph/incidents_graphml/9/975067a0-5161-11ed-8537-055dd7dfd795.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f3e8d53f152c87b5ab2a67d838a666c907bebae4
--- /dev/null
+++ b/graph/incidents_graphml/9/975067a0-5161-11ed-8537-055dd7dfd795.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.116
+ 100.64.30.116
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.240
+ 100.64.1.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.129
+ 100.64.72.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666371511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 975067a0-5161-11ed-8537-055dd7dfd795
+
+
+ INCIDENT_LINK
+ 1666371511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 975067a0-5161-11ed-8537-055dd7dfd795
+
+
+ INCIDENT_LINK
+ 1666371511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 975067a0-5161-11ed-8537-055dd7dfd795
+
+
+ INCIDENT_LINK
+ 1666371511
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 975067a0-5161-11ed-8537-055dd7dfd795
+
+
+
diff --git a/graph/incidents_graphml/9/97557a50-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97557a50-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..154f9691cddd5404e05395970233ad4b421f1f34
--- /dev/null
+++ b/graph/incidents_graphml/9/97557a50-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.74
+ 100.64.10.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115351
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97557a50-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/9761c210-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/9761c210-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..20020b5d074e46cacb304989fa5eb7afe16de57d
--- /dev/null
+++ b/graph/incidents_graphml/9/9761c210-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.147
+ 100.64.23.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9761c210-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/977104d0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/977104d0-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2171042dff8741273cff4a11fc8fd926cf362bf
--- /dev/null
+++ b/graph/incidents_graphml/9/977104d0-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.25.106
+ 100.64.25.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104780
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977104d0-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/9/97723cd0-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/97723cd0-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fdb0cbe8cf95bc77a0d0adbeb4e9840270e41a0
--- /dev/null
+++ b/graph/incidents_graphml/9/97723cd0-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.189
+ 100.64.45.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97723cd0-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/977458b0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/977458b0-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2ce05d341934f699d5ec9dad2158b6aae0667f12
--- /dev/null
+++ b/graph/incidents_graphml/9/977458b0-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.196
+ USER-0015-1320.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389529
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 977458b0-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/9776c210-2fea-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/9/9776c210-2fea-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..452cf07de244a2ea6179346e4d3d3ac51389bcfa
--- /dev/null
+++ b/graph/incidents_graphml/9/9776c210-2fea-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.92.23
+ USER-0015-2082.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718987008
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9776c210-2fea-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/9/977cf460-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/977cf460-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3b756bc5807829cc2806b165f87a079e0899083c
--- /dev/null
+++ b/graph/incidents_graphml/9/977cf460-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,157 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.39
+ 100.64.73.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.63
+ 100.64.72.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.69
+ 100.64.72.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977cf460-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977cf460-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977cf460-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977cf460-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977cf460-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977cf460-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/977e7a20-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/977e7a20-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bea313cb3244d8e39ee4d095cc80adbee0f9e61f
--- /dev/null
+++ b/graph/incidents_graphml/9/977e7a20-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292996
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977e7a20-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/977f6560-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/977f6560-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..91b2af0259b66c0af27f6dc7e244a11f358908a7
--- /dev/null
+++ b/graph/incidents_graphml/9/977f6560-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,553 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.41
+ 100.64.73.41
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.159
+ 100.64.1.159
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.13.1
+ 100.64.13.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.39
+ 100.64.14.39
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.42
+ 100.64.73.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.224
+ 100.64.71.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.43
+ 100.64.73.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.44
+ 100.64.73.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.45
+ 100.64.73.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.46
+ 100.64.73.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.79
+ 100.64.72.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.47
+ 100.64.73.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.51.48
+ 100.64.51.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.48
+ 100.64.73.48
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.21
+ 100.64.73.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144106
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 977f6560-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/977faad0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/977faad0-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ffab2577fbdb6a8903c643e935f5c4fd9dfcc23
--- /dev/null
+++ b/graph/incidents_graphml/9/977faad0-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.106
+ 100.64.25.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104780
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 977faad0-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/9/97863a00-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/97863a00-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3e550e5d6401e4ef8f49e8a398334f75cc292e2
--- /dev/null
+++ b/graph/incidents_graphml/9/97863a00-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.189
+ 100.64.45.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751699
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97863a00-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/9786cc40-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/9786cc40-2816-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1639ed893c368c824e0c0eb4ff3925528943fe6e
--- /dev/null
+++ b/graph/incidents_graphml/9/9786cc40-2816-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.37
+ 100.64.34.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718126296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9786cc40-2816-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/9/978dbc60-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/978dbc60-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c48fc9217e7984646a1e779c948fdca08785c1f
--- /dev/null
+++ b/graph/incidents_graphml/9/978dbc60-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.32.100
+ 100.64.32.100
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 978dbc60-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/978ebe80-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/978ebe80-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fc31bb3278a26e1798fe1bf237e4ff9c64afb133
--- /dev/null
+++ b/graph/incidents_graphml/9/978ebe80-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.196
+ USER-0015-1320.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389529
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 978ebe80-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/97915a80-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/97915a80-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7b0e7b89149aa66ee7b03c02178b4594a60cd97
--- /dev/null
+++ b/graph/incidents_graphml/9/97915a80-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.177
+ 100.64.11.177
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971006
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97915a80-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/97917de0-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/97917de0-5560-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28c07cf2f842016dd0548c02f3a82acb7bbfa52e
--- /dev/null
+++ b/graph/incidents_graphml/9/97917de0-5560-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,545 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.71
+ 100.64.45.71
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.72
+ 100.64.45.72
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.73
+ 100.64.45.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.74
+ 100.64.45.74
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.75
+ 100.64.45.75
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.93
+ 100.64.25.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.104
+ USER-0015-1322.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.94375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.76
+ 100.64.45.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.77
+ 100.64.45.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.169
+ 100.64.22.169
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.183
+ 100.64.7.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.78
+ 100.64.45.78
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.79
+ 100.64.45.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958384
+ malicious
+ 0.94375
+ 0.94375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97917de0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/9/979666a0-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/979666a0-77e0-11ee-9673-bb6a5cba9414.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bdafac1d5fa965e0babb822f30dc1d153b6263d
--- /dev/null
+++ b/graph/incidents_graphml/9/979666a0-77e0-11ee-9673-bb6a5cba9414.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.44.73
+ 100.64.44.73
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698751699
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 979666a0-77e0-11ee-9673-bb6a5cba9414
+
+
+
diff --git a/graph/incidents_graphml/9/979e1010-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/979e1010-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13ace0f75e0e87e6db3f10793e07ae8fe154f8ae
--- /dev/null
+++ b/graph/incidents_graphml/9/979e1010-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.114
+ 100.64.33.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292997
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 979e1010-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/979f8b50-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/979f8b50-67ae-11ee-bbb0-b746705ccafc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b04cebbd929d907614d3360bba9cf0c2326cfd06
--- /dev/null
+++ b/graph/incidents_graphml/9/979f8b50-67ae-11ee-bbb0-b746705ccafc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.191
+ 100.64.52.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696971006
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 979f8b50-67ae-11ee-bbb0-b746705ccafc
+
+
+
diff --git a/graph/incidents_graphml/9/979fab70-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/979fab70-2816-11ef-acb4-432fc0d170c1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf3d8b8050fed19134d3cad2cddf70633fc21738
--- /dev/null
+++ b/graph/incidents_graphml/9/979fab70-2816-11ef-acb4-432fc0d170c1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.37
+ 100.64.34.37
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718126297
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 979fab70-2816-11ef-acb4-432fc0d170c1
+
+
+
diff --git a/graph/incidents_graphml/9/97a04fe0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/97a04fe0-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fcba4834a3dc4fcc425d83d0f3fe7ee09ea6200f
--- /dev/null
+++ b/graph/incidents_graphml/9/97a04fe0-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.86
+ 100.64.85.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661196076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97a04fe0-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/97b25140-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/97b25140-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3d648e946e95aa530df905175202efc0c1e3d80
--- /dev/null
+++ b/graph/incidents_graphml/9/97b25140-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.86
+ 100.64.85.86
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1661196076
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97b25140-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/97b844b0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/97b844b0-224f-11ed-be68-fd583a4df292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f220bfd4e27fdc4dbda1a5b7c6b15a563c37b397
--- /dev/null
+++ b/graph/incidents_graphml/9/97b844b0-224f-11ed-be68-fd583a4df292.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.90
+ 100.64.85.90
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1661196076
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97b844b0-224f-11ed-be68-fd583a4df292
+
+
+
diff --git a/graph/incidents_graphml/9/97bacff0-2fea-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/9/97bacff0-2fea-11ef-bbc8-b57a691da072.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f98d54fdb11926b928192038459eaa9d40012b8
--- /dev/null
+++ b/graph/incidents_graphml/9/97bacff0-2fea-11ef-bbc8-b57a691da072.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.92.25
+ 100.64.92.25
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718987008
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97bacff0-2fea-11ef-bbc8-b57a691da072
+
+
+
diff --git a/graph/incidents_graphml/9/97c852b0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97c852b0-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e0f0dcc72f1513c81b70da4b7395573e7fb86824
--- /dev/null
+++ b/graph/incidents_graphml/9/97c852b0-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.96
+ 100.64.71.96
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97c852b0-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97cd5bc0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97cd5bc0-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..79497a80acd05263bf30d818dbad4bee35210ca6
--- /dev/null
+++ b/graph/incidents_graphml/9/97cd5bc0-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.96
+ 100.64.71.96
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97cd5bc0-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97d12b00-a932-11ed-a973-7df772fdd65e.graphml b/graph/incidents_graphml/9/97d12b00-a932-11ed-a973-7df772fdd65e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..454c7a1f038f0a52d9a926b7b38f9abd602e60b0
--- /dev/null
+++ b/graph/incidents_graphml/9/97d12b00-a932-11ed-a973-7df772fdd65e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.54
+ 100.64.84.54
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1676027027
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97d12b00-a932-11ed-a973-7df772fdd65e
+
+
+
diff --git a/graph/incidents_graphml/9/97dace90-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/97dace90-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e98ea1d6ce01a4555c15726fe04a384f0f3d970
--- /dev/null
+++ b/graph/incidents_graphml/9/97dace90-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.23
+ 100.64.15.23
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97dace90-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/97db6450-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/9/97db6450-09ab-11ef-a326-59a1bcca7fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8ecc599765d2c222f2ef01f4f731f743ff1d89ea
--- /dev/null
+++ b/graph/incidents_graphml/9/97db6450-09ab-11ef-a326-59a1bcca7fdf.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.44
+ 100.64.49.44
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.46
+ 100.64.10.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1714781806
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97db6450-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781806
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97db6450-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781806
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97db6450-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781806
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97db6450-09ab-11ef-a326-59a1bcca7fdf
+
+
+
diff --git a/graph/incidents_graphml/9/97de0b40-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97de0b40-8447-11ee-823e-1956338371c0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81d28681e6cbe703c66f3aaf4414cda65f6bf009
--- /dev/null
+++ b/graph/incidents_graphml/9/97de0b40-8447-11ee-823e-1956338371c0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.243
+ 100.64.24.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700115352
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97de0b40-8447-11ee-823e-1956338371c0
+
+
+
diff --git a/graph/incidents_graphml/9/97e2fd50-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/97e2fd50-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cc7083cc7051e0d246bc4887504b8ee36a6726a
--- /dev/null
+++ b/graph/incidents_graphml/9/97e2fd50-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.3.208
+ 100.64.3.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224014
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97e2fd50-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/97e577a0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97e577a0-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3d643f622cf44e9eae749d60378282f90f797152
--- /dev/null
+++ b/graph/incidents_graphml/9/97e577a0-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.76
+ 100.64.71.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97e577a0-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97eaf5e0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97eaf5e0-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..764b3ed0c484c1a6aa1bcc3a354026c0b4e88891
--- /dev/null
+++ b/graph/incidents_graphml/9/97eaf5e0-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.76
+ 100.64.71.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97eaf5e0-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97ee2a30-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97ee2a30-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..13af229de2137ec624d90829f64d1c46ef37a883
--- /dev/null
+++ b/graph/incidents_graphml/9/97ee2a30-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.191
+ USER-0015-1919.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97ee2a30-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97f13cc0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/97f13cc0-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..38b843c80ce0081d4dfab31e659ee26df6fc59d6
--- /dev/null
+++ b/graph/incidents_graphml/9/97f13cc0-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.24
+ 100.64.15.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97f13cc0-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/97f37810-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/97f37810-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..624d951e5378d82be2aba517c8275440f4b197f0
--- /dev/null
+++ b/graph/incidents_graphml/9/97f37810-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.3.208
+ 100.64.3.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224014
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 97f37810-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/97f38160-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97f38160-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..78c12a1d9e8eba383b32c53d98490fbdf46c2b4f
--- /dev/null
+++ b/graph/incidents_graphml/9/97f38160-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.191
+ USER-0015-1919.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97f38160-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97f583a0-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/97f583a0-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a73602cd86ae90ee69b4519c86b3e8088f82eec5
--- /dev/null
+++ b/graph/incidents_graphml/9/97f583a0-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.114.157.160
+ 10.114.157.160
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057522
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97f583a0-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057522
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 97f583a0-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/97f5b390-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/9/97f5b390-928d-11ee-92fb-e74bdedb3c0b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33219172c4016ea970bb493fd85f27442fc8356f
--- /dev/null
+++ b/graph/incidents_graphml/9/97f5b390-928d-11ee-92fb-e74bdedb3c0b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.217
+ 100.64.45.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1701684733
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97f5b390-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684733
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97f5b390-928d-11ee-92fb-e74bdedb3c0b
+
+
+
diff --git a/graph/incidents_graphml/9/97f77900-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97f77900-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b10b96507573150fdcbd9cd4816f6bd20c692b81
--- /dev/null
+++ b/graph/incidents_graphml/9/97f77900-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.74.160
+ 100.64.74.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97f77900-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97fca920-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97fca920-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..381aea0925b929de54784bba935e7b17597053f2
--- /dev/null
+++ b/graph/incidents_graphml/9/97fca920-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.74.160
+ 100.64.74.160
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 97fca920-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/97ffb660-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97ffb660-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5b3688a0d00a0afce2beaf4ad2f4391431a3f2bb
--- /dev/null
+++ b/graph/incidents_graphml/9/97ffb660-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.244
+ 100.64.70.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 97ffb660-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/9804e680-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/9804e680-28d0-11ed-8866-05560d02e218.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b16200a708567caf460b9af1b333d77b8ff8125e
--- /dev/null
+++ b/graph/incidents_graphml/9/9804e680-28d0-11ed-8866-05560d02e218.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.244
+ 100.64.70.244
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661911188
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9804e680-28d0-11ed-8866-05560d02e218
+
+
+
diff --git a/graph/incidents_graphml/9/980aa870-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/980aa870-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6340c602d9827ab08292d8c14a22822991141bf
--- /dev/null
+++ b/graph/incidents_graphml/9/980aa870-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.6
+ 100.64.23.6
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.116
+ 100.64.72.116
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196554
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 980aa870-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196554
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 980aa870-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/9811e5a0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/9811e5a0-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2c3c3dcc82f290c16f81af21846fc070db6bbd9f
--- /dev/null
+++ b/graph/incidents_graphml/9/9811e5a0-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.96
+ 100.64.76.96
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714742
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9811e5a0-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/982210c0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/982210c0-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c4c8f296958eef83223b099d9f47b122ccd3c324
--- /dev/null
+++ b/graph/incidents_graphml/9/982210c0-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.24
+ 100.64.15.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262995
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 982210c0-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c55fe12cfe6f1243c680dda8de489b4c4303bfbd
--- /dev/null
+++ b/graph/incidents_graphml/9/9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,539 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.25
+ 100.64.12.25
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.89
+ 100.64.45.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.90
+ 100.64.45.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.91
+ 100.64.45.91
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.206
+ 100.64.34.206
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.176
+ 100.64.31.176
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.29
+ 100.64.8.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.215
+ 100.64.18.215
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.180
+ 100.64.35.180
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.92
+ 100.64.45.92
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.93
+ 100.64.45.93
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.94
+ 100.64.45.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.95
+ 100.64.45.95
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.190
+ 100.64.20.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/9/982d1da0-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/982d1da0-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f019700ee32314f029fc204a65bf480bdf1a95a4
--- /dev/null
+++ b/graph/incidents_graphml/9/982d1da0-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.191
+ 100.64.72.191
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.58.79
+ 100.64.58.79
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687192655
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 982d1da0-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192655
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 982d1da0-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192655
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 982d1da0-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192655
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 982d1da0-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/98317670-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/98317670-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..008dd68f25fecaa010a13623832c6a7fafc7b704
--- /dev/null
+++ b/graph/incidents_graphml/9/98317670-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.253
+ 100.64.10.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98317670-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698292998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98317670-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/984067f0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/984067f0-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..378fd1d73a227b02f3bce773a309bfc2ed850d64
--- /dev/null
+++ b/graph/incidents_graphml/9/984067f0-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.90
+ 100.64.72.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.91
+ 100.64.72.91
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.92
+ 100.64.72.92
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.93
+ 100.64.72.93
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.58.162
+ 100.64.58.162
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.48.229
+ 100.64.48.229
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.233
+ 100.64.71.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.59.165
+ 100.64.59.165
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 984067f0-238e-11ee-8f53-17c8a7373bd3
+
+
+
diff --git a/graph/incidents_graphml/9/98412de0-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/98412de0-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6508c331207348d457ca92f9364968405f4ef5db
--- /dev/null
+++ b/graph/incidents_graphml/9/98412de0-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.253
+ 100.64.10.253
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 98412de0-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/984a59b0-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/9/984a59b0-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ac41497724b79a4f205d972dfdef59f0f7d2582
--- /dev/null
+++ b/graph/incidents_graphml/9/984a59b0-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.119
+ 100.64.85.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694431822
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 984a59b0-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/9/984b9730-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/984b9730-f340-11ec-a343-c72f25ca2eb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..39f0b7e3c7515e03fdb58191e30a0c56297cefdb
--- /dev/null
+++ b/graph/incidents_graphml/9/984b9730-f340-11ec-a343-c72f25ca2eb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.219
+ 100.64.73.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.10.93
+ 100.64.10.93
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656021930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 984b9730-f340-11ec-a343-c72f25ca2eb2
+
+
+ INCIDENT_LINK
+ 1656021930
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 984b9730-f340-11ec-a343-c72f25ca2eb2
+
+
+
diff --git a/graph/incidents_graphml/9/984d9bf0-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/9/984d9bf0-2957-11ed-833a-955cfd42297d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08027c34c869bf312b19cb726038d6070c615923
--- /dev/null
+++ b/graph/incidents_graphml/9/984d9bf0-2957-11ed-833a-955cfd42297d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.144
+ 100.64.88.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ 10.74.211.215
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1661969171
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 984d9bf0-2957-11ed-833a-955cfd42297d
+
+
+
diff --git a/graph/incidents_graphml/9/9851f6c0-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9851f6c0-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f8274ccccd73bc81d783a438d131bc769ae8cb27
--- /dev/null
+++ b/graph/incidents_graphml/9/9851f6c0-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.114
+ 100.64.33.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292998
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9851f6c0-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/9858f900-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9858f900-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd4a2cddf55ebdf8341e88e194b9e0cc6e60715a
--- /dev/null
+++ b/graph/incidents_graphml/9/9858f900-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.210.77.251
+ 10.210.77.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.94
+ 100.64.72.94
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.95
+ 100.64.72.95
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9858f900-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9858f900-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9858f900-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480584
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9858f900-238e-11ee-8f53-17c8a7373bd3
+
+
+
diff --git a/graph/incidents_graphml/9/985f0400-05b4-11ee-9e30-fd3f69b84945.graphml b/graph/incidents_graphml/9/985f0400-05b4-11ee-9e30-fd3f69b84945.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47f3ce13050734be636722558ae93372b8d2ac79
--- /dev/null
+++ b/graph/incidents_graphml/9/985f0400-05b4-11ee-9e30-fd3f69b84945.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.189
+ 100.64.12.189
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.29
+ 100.64.68.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.18
+ 100.64.14.18
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.51.48
+ 100.64.51.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1686198370
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 985f0400-05b4-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198370
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 985f0400-05b4-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198370
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 985f0400-05b4-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198370
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 985f0400-05b4-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198370
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 985f0400-05b4-11ee-9e30-fd3f69b84945
+
+
+ INCIDENT_LINK
+ 1686198370
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 985f0400-05b4-11ee-9e30-fd3f69b84945
+
+
+
diff --git a/graph/incidents_graphml/9/98666920-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/98666920-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b98a3a3b16e5bb8b22d27fdb9bcaa15c4d06635
--- /dev/null
+++ b/graph/incidents_graphml/9/98666920-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.183
+ 100.64.37.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698292998
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98666920-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/986bdf90-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/986bdf90-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..24bfa48111d9ca07c1e86d7af8bf44c1d379dbc1
--- /dev/null
+++ b/graph/incidents_graphml/9/986bdf90-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.27
+ 100.64.56.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 986bdf90-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/9/986d98b0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/986d98b0-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b26f827ec4b31fb3297c8e919f4849099d7eda7a
--- /dev/null
+++ b/graph/incidents_graphml/9/986d98b0-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.27
+ 100.64.15.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262996
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 986d98b0-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/98752e80-3a82-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/98752e80-3a82-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aef628fe38251799230e0a1cd26144a2a2a7bb7e
--- /dev/null
+++ b/graph/incidents_graphml/9/98752e80-3a82-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,205 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.132
+ 100.64.9.132
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.88
+ 100.64.68.88
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.54.216
+ 100.64.54.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004307
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host","Exploited Service"]
+ complete-mission
+ Disrupted
+ 98752e80-3a82-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/9/987ad3b0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/987ad3b0-965f-11ee-897e-618c2c7bcb08.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18e620b92b8457f0ba635f3a3b9a579081e20e2c
--- /dev/null
+++ b/graph/incidents_graphml/9/987ad3b0-965f-11ee-897e-618c2c7bcb08.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.27
+ 100.64.56.27
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702104782
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 987ad3b0-965f-11ee-897e-618c2c7bcb08
+
+
+
diff --git a/graph/incidents_graphml/9/988907e0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/988907e0-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..312d185873e7851617d31c8a8cb6f23b52de73ed
--- /dev/null
+++ b/graph/incidents_graphml/9/988907e0-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.208
+ 100.64.51.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090006
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 988907e0-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9892ad50-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/9/9892ad50-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e518010aa6f9d2512350abcc319e10466061f01c
--- /dev/null
+++ b/graph/incidents_graphml/9/9892ad50-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.85.123
+ USER-0015-1971.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1694431823
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9892ad50-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/9/98a1ef90-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/9/98a1ef90-5096-11ee-861e-f1beba7e8aa3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c829dd95bc00c035437e900c2a33ba2db18ad2df
--- /dev/null
+++ b/graph/incidents_graphml/9/98a1ef90-5096-11ee-861e-f1beba7e8aa3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.74.211.215
+ HOST-17029
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.85.123
+ USER-0015-1971.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694431823
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98a1ef90-5096-11ee-861e-f1beba7e8aa3
+
+
+
diff --git a/graph/incidents_graphml/9/98a90f70-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/98a90f70-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..265cde3856a4f79a6d33ef5ab149b54d2866186f
--- /dev/null
+++ b/graph/incidents_graphml/9/98a90f70-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.242
+ 100.64.52.242
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398682
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98a90f70-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/98aa67b0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/98aa67b0-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b10c0e215ec528b68069ec9dff0aeeea4fdba9f7
--- /dev/null
+++ b/graph/incidents_graphml/9/98aa67b0-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.198
+ 100.64.38.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389531
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 98aa67b0-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/98b12950-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/98b12950-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..438c89b553f342e1a12a70c7352e618fe7d67aa1
--- /dev/null
+++ b/graph/incidents_graphml/9/98b12950-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.208
+ 100.64.51.208
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090006
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98b12950-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/98b57840-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/98b57840-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fac56e3a2464f0496d6872f0f15d77989c7f1bc5
--- /dev/null
+++ b/graph/incidents_graphml/9/98b57840-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.138.95.225
+ 10.138.95.225
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057523
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 98b57840-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057523
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 98b57840-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/98b8ef30-ada1-11ed-a484-f73b989f2034.graphml b/graph/incidents_graphml/9/98b8ef30-ada1-11ed-a484-f73b989f2034.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..08aca5b23962b7805e11d7e112c7c07e6d46ca14
--- /dev/null
+++ b/graph/incidents_graphml/9/98b8ef30-ada1-11ed-a484-f73b989f2034.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.50
+ 100.64.72.50
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.51
+ 100.64.72.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.53
+ 100.64.72.53
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.54
+ 100.64.72.54
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.55
+ 100.64.72.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.56
+ 100.64.72.56
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.57
+ 100.64.72.57
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.72.58
+ 100.64.72.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.71.143
+ 100.64.71.143
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.1.159
+ HOST-12822
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+ INCIDENT_LINK
+ 1676514508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98b8ef30-ada1-11ed-a484-f73b989f2034
+
+
+
diff --git a/graph/incidents_graphml/9/98cfdcf0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/98cfdcf0-33c4-11ee-ae17-5996ccab4a65.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..34d4443cbdbcc683e0c9b3894a2170caef425979
--- /dev/null
+++ b/graph/incidents_graphml/9/98cfdcf0-33c4-11ee-ae17-5996ccab4a65.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.29
+ 100.64.15.29
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1691262996
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98cfdcf0-33c4-11ee-ae17-5996ccab4a65
+
+
+
diff --git a/graph/incidents_graphml/9/98d5e480-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/98d5e480-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a46da4232dd0a049e161b1f6f6078558ad87af2
--- /dev/null
+++ b/graph/incidents_graphml/9/98d5e480-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.198
+ 100.64.38.198
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389532
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98d5e480-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/98d7f830-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/98d7f830-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97967ce161faa8e551ed91263cc6be9c3456afbc
--- /dev/null
+++ b/graph/incidents_graphml/9/98d7f830-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766006
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 98d7f830-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/98dbebc0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/98dbebc0-2483-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..94fbe53b12c6d4afb16728687ea0e3cc5319898a
--- /dev/null
+++ b/graph/incidents_graphml/9/98dbebc0-2483-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,761 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.247
+ 100.64.23.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.29
+ 100.64.8.29
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.112
+ 100.64.16.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.248
+ 100.64.23.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.249
+ 100.64.23.249
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.221
+ 100.64.2.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.250
+ USER-0015-1246.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.251
+ 100.64.23.251
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.151
+ 100.64.22.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.253
+ 100.64.23.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.178
+ 100.64.8.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.254
+ 100.64.23.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.255
+ 100.64.23.255
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.2
+ 100.64.24.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.3
+ 100.64.24.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98dbebc0-2483-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/9/98e7fbb0-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/98e7fbb0-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f2c43b92558571dee95fc1f1b5bc276661d31f5
--- /dev/null
+++ b/graph/incidents_graphml/9/98e7fbb0-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.189
+ 100.64.80.189
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.188
+ USER-0015-1726.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446834
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98e7fbb0-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446834
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98e7fbb0-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/98ea43a0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/98ea43a0-2483-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6d38ed327ac7003a6fead90f06faff807afe982
--- /dev/null
+++ b/graph/incidents_graphml/9/98ea43a0-2483-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,445 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.2.221
+ 100.64.2.221
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.250
+ USER-0015-1246.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.251
+ 100.64.23.251
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.22.151
+ 100.64.22.151
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.252
+ 100.64.23.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.253
+ 100.64.23.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.178
+ 100.64.8.178
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.254
+ 100.64.23.254
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.255
+ 100.64.23.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733309
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ea43a0-2483-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/9/98eda100-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/98eda100-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce4519a214b31d5c58fcfe811e908c42986174cc
--- /dev/null
+++ b/graph/incidents_graphml/9/98eda100-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.93.85.41
+ 10.93.85.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.190
+ 100.64.80.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446834
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98eda100-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446834
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98eda100-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/98ee6b60-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/98ee6b60-898d-11ee-afb8-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b53e0f6f1bfa093f83472a8de1d1b26be4155135
--- /dev/null
+++ b/graph/incidents_graphml/9/98ee6b60-898d-11ee-afb8-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.5.83
+ 100.64.5.83
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700695174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98ee6b60-898d-11ee-afb8-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/98f06230-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/98f06230-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35a1956c7ca4f6a7322551bd46118da313257eca
--- /dev/null
+++ b/graph/incidents_graphml/9/98f06230-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.246
+ 100.64.12.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766006
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 98f06230-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/98f49460-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/98f49460-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8a00c86ae5e243023da85441c9025496fd9ebcfc
--- /dev/null
+++ b/graph/incidents_graphml/9/98f49460-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.115
+ 100.64.39.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98f49460-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/98f5bab0-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/98f5bab0-f3c2-11ee-b267-b349fce9e52a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6c10cd2714767f1e1ce1c4bf56b8aaaf4d82efaf
--- /dev/null
+++ b/graph/incidents_graphml/9/98f5bab0-f3c2-11ee-b267-b349fce9e52a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.30
+ 100.64.7.30
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712372761
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 98f5bab0-f3c2-11ee-b267-b349fce9e52a
+
+
+
diff --git a/graph/incidents_graphml/9/98f7eb70-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/98f7eb70-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f63907f99559bb070e329a94251d022e7a7f60b
--- /dev/null
+++ b/graph/incidents_graphml/9/98f7eb70-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.200
+ 100.64.38.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389532
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 98f7eb70-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/99062090-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/99062090-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5972687336a4a30e3fc6e6ea1c484f98abf9e13
--- /dev/null
+++ b/graph/incidents_graphml/9/99062090-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.115
+ 100.64.39.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224016
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99062090-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/990cefe0-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/990cefe0-898d-11ee-afb8-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4f40feebe48f7d4913988556fc30c3f2d7147524
--- /dev/null
+++ b/graph/incidents_graphml/9/990cefe0-898d-11ee-afb8-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.187
+ 100.64.22.187
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700695174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990cefe0-898d-11ee-afb8-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/990d6f80-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/990d6f80-5560-11ee-8e2f-e12aa4f0d6f4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae29518a9ee826df749a0505efae92edb29254ed
--- /dev/null
+++ b/graph/incidents_graphml/9/990d6f80-5560-11ee-8e2f-e12aa4f0d6f4.graphml
@@ -0,0 +1,777 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.103
+ 100.64.45.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.55
+ 100.64.23.55
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.57
+ 100.64.45.57
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.104
+ USER-0015-1348.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.105
+ 100.64.45.105
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.34
+ 100.64.38.34
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.106
+ 100.64.45.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.45
+ 100.64.19.45
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.223
+ 100.64.25.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.107
+ 100.64.45.107
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.59
+ 100.64.13.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.55
+ USER-0015-1347.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.108
+ USER-0015-1349.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.45.109
+ 100.64.45.109
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+ INCIDENT_LINK
+ 1694958386
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4
+
+
+
diff --git a/graph/incidents_graphml/9/9913dc30-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9913dc30-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b23bf5bf9482e99c49a0a1c352f77965f61c4e6b
--- /dev/null
+++ b/graph/incidents_graphml/9/9913dc30-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.117
+ 100.64.39.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9913dc30-8544-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700224016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9913dc30-8544-11ee-89b4-37c02fa13bd9
+
+
+ INCIDENT_LINK
+ 1700224016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9913dc30-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/99205b00-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/99205b00-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41fd9f90f81080c07b08b153f35937bd8c3368b1
--- /dev/null
+++ b/graph/incidents_graphml/9/99205b00-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.200
+ 100.64.38.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389532
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99205b00-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/9924cc20-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9924cc20-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..908f42bf0c930fdd462f0a0870177045d9524adb
--- /dev/null
+++ b/graph/incidents_graphml/9/9924cc20-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.117
+ 100.64.39.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224016
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9924cc20-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/992532d0-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/992532d0-898d-11ee-afb8-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65cd5d42286a5d599a5ca7730b21ba0a27b7ee02
--- /dev/null
+++ b/graph/incidents_graphml/9/992532d0-898d-11ee-afb8-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.175
+ 100.64.67.175
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700695174
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 992532d0-898d-11ee-afb8-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/99260af0-1aa4-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/9/99260af0-1aa4-11ee-ae54-3b636b49055b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58db67c30aa9516c222f0c75b571d5b4de1eb6d7
--- /dev/null
+++ b/graph/incidents_graphml/9/99260af0-1aa4-11ee-ae54-3b636b49055b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1109.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.29.2
+ 100.64.29.2
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688500474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99260af0-1aa4-11ee-ae54-3b636b49055b
+
+
+
diff --git a/graph/incidents_graphml/9/9926acc0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9926acc0-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1b1cb3dd97157e86fd0420fbc05c24c0bc5b25d1
--- /dev/null
+++ b/graph/incidents_graphml/9/9926acc0-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,783 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.49
+ 100.64.73.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.116
+ 100.64.71.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.68.216
+ 100.64.68.216
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.39
+ 100.64.73.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.40
+ 100.64.73.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.63
+ 100.64.72.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.940673828125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.69
+ 100.64.72.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.50
+ 100.64.73.50
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.51
+ 100.64.73.51
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.8.80
+ 100.64.8.80
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.52
+ 100.64.73.52
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.27.191
+ 100.64.27.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.53
+ 100.64.73.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.54
+ 100.64.73.54
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.123
+ 100.64.71.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.55
+ 100.64.73.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.56
+ HOST-13203
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.13.57
+ 100.64.13.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.57
+ 100.64.73.57
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.45.196
+ 100.64.45.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.254
+ HOST-13204
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144109
+ malicious
+ 0.940673828125
+ 0.940673828125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9926acc0-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/992f4bc0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/992f4bc0-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..93c8617ea36118b025e10968e44beaa26fc77ba1
--- /dev/null
+++ b/graph/incidents_graphml/9/992f4bc0-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.181
+ 100.64.8.181
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773017
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 992f4bc0-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/993a2f70-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/993a2f70-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2d8e8fdcc8056ed5fe37c187f5608fca8a4fa0c
--- /dev/null
+++ b/graph/incidents_graphml/9/993a2f70-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.227
+ 100.64.40.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 993a2f70-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/993ef130-5161-11ed-8537-055dd7dfd795.graphml b/graph/incidents_graphml/9/993ef130-5161-11ed-8537-055dd7dfd795.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ee4acd3510e57ff8d6a02d50405a55dfe53d58ad
--- /dev/null
+++ b/graph/incidents_graphml/9/993ef130-5161-11ed-8537-055dd7dfd795.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.127
+ 100.64.29.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.130
+ 100.64.72.130
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1666371514
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 993ef130-5161-11ed-8537-055dd7dfd795
+
+
+
diff --git a/graph/incidents_graphml/9/995a1380-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/995a1380-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c3acdfb48619ca2500c9520d48e1b224809651b2
--- /dev/null
+++ b/graph/incidents_graphml/9/995a1380-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.227
+ 100.64.40.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 995a1380-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9961b860-a812-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/9/9961b860-a812-11ee-99fc-3f84722b2bdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7492dec4d70191f85a176a08d28e5cea15de54ad
--- /dev/null
+++ b/graph/incidents_graphml/9/9961b860-a812-11ee-99fc-3f84722b2bdf.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.243
+ 100.64.68.243
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.38
+ 100.64.68.38
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1704050833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9961b860-a812-11ee-99fc-3f84722b2bdf
+
+
+ INCIDENT_LINK
+ 1704050833
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9961b860-a812-11ee-99fc-3f84722b2bdf
+
+
+
diff --git a/graph/incidents_graphml/9/996fa950-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/996fa950-898d-11ee-afb8-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d21cb11dfcd3e6e67ff67681dd1e401cc920c0d
--- /dev/null
+++ b/graph/incidents_graphml/9/996fa950-898d-11ee-afb8-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700695175
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 996fa950-898d-11ee-afb8-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/99717e20-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/9/99717e20-928d-11ee-92fb-e74bdedb3c0b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0cd478009a38d91a59990c94640c17658b484c8b
--- /dev/null
+++ b/graph/incidents_graphml/9/99717e20-928d-11ee-92fb-e74bdedb3c0b.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.120
+ 100.64.69.120
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.28
+ 100.64.68.28
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1701684735
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99717e20-928d-11ee-92fb-e74bdedb3c0b
+
+
+ INCIDENT_LINK
+ 1701684735
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99717e20-928d-11ee-92fb-e74bdedb3c0b
+
+
+
diff --git a/graph/incidents_graphml/9/997380f0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/997380f0-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..40447dff671a25bf10eb41794107605ff5099dae
--- /dev/null
+++ b/graph/incidents_graphml/9/997380f0-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.157
+ 100.64.72.157
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.102
+ USER-0015-1636.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687961456
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 997380f0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961456
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 997380f0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/9/997439b0-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/9/997439b0-182d-11ee-88ad-19cfc5af29bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3e3bfbd10aea2965ae5246f044b1e37dc29cf082
--- /dev/null
+++ b/graph/incidents_graphml/9/997439b0-182d-11ee-88ad-19cfc5af29bb.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.39
+ 100.64.54.39
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.184
+ 100.64.77.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.24.1
+ 100.64.24.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.185
+ 100.64.77.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997439b0-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997439b0-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997439b0-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997439b0-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997439b0-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229462
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997439b0-182d-11ee-88ad-19cfc5af29bb
+
+
+
diff --git a/graph/incidents_graphml/9/997633b0-fb1c-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/9/997633b0-fb1c-11ed-895b-69b7bcd870e2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7239801e9703c983552d41d85e8072cf265243d5
--- /dev/null
+++ b/graph/incidents_graphml/9/997633b0-fb1c-11ed-895b-69b7bcd870e2.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.34
+ 100.64.41.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","PAN NGFW"]
+
+
+ HOST
+ 100.64.43.112
+ 100.64.43.112
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.51.106
+ 100.64.51.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.104
+ 100.64.10.104
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+ INCIDENT_LINK
+ 1685033577
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997633b0-fb1c-11ed-895b-69b7bcd870e2
+
+
+
diff --git a/graph/incidents_graphml/9/997b3b00-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/997b3b00-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0005f79b6a4b25ea099e14103d027eb68ea35d5c
--- /dev/null
+++ b/graph/incidents_graphml/9/997b3b00-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.86
+ 100.64.78.86
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.111
+ 100.64.71.111
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446835
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 997b3b00-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446835
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 997b3b00-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/997d3510-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/997d3510-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f7e3b2bdd2c2627b1aa74c83a77e46ffcc43e38c
--- /dev/null
+++ b/graph/incidents_graphml/9/997d3510-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.121.19.179
+ 10.121.19.179
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057524
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997d3510-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057524
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 997d3510-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/997e2170-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/997e2170-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..545653546d8a8b0910f37e68745b8dc55d8ef73d
--- /dev/null
+++ b/graph/incidents_graphml/9/997e2170-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.73
+ 100.64.23.73
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749991
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 997e2170-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/99810e70-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/99810e70-898d-11ee-afb8-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..507cf8dba3fb11d78e3df1911188b38e2dff34ab
--- /dev/null
+++ b/graph/incidents_graphml/9/99810e70-898d-11ee-afb8-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.112
+ 100.64.8.112
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700695175
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 99810e70-898d-11ee-afb8-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/99825c00-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/99825c00-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..894b24d3e335f0abd40e56c1e582f75b56705c2f
--- /dev/null
+++ b/graph/incidents_graphml/9/99825c00-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.30
+ HOST-11232
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99825c00-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090007
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99825c00-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9983c4c0-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9983c4c0-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a21a6e8ebe1a92b1771f2d04e4363ca65e8a1d4
--- /dev/null
+++ b/graph/incidents_graphml/9/9983c4c0-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.148.1.216
+ 10.148.1.216
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057525
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9983c4c0-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057525
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9983c4c0-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/998660d0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/998660d0-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4e62cafcb4784d0f6758f99aec4a80e0a0e5a19a
--- /dev/null
+++ b/graph/incidents_graphml/9/998660d0-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.113
+ 100.64.31.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171286
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 998660d0-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/998c74e0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/998c74e0-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9a2af8dd185e552924004634bc297d97604dfab
--- /dev/null
+++ b/graph/incidents_graphml/9/998c74e0-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.186
+ 100.64.35.186
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788902
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 998c74e0-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/998fdb80-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/998fdb80-898d-11ee-afb8-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fb4fce070d70386b210d3e7a01c0944064f7ac5
--- /dev/null
+++ b/graph/incidents_graphml/9/998fdb80-898d-11ee-afb8-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.233
+ 100.64.25.233
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700695175
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 998fdb80-898d-11ee-afb8-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/9995ef30-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9995ef30-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..51a7a89e28c8c71f2bfbf8196da6a74a39c7fc40
--- /dev/null
+++ b/graph/incidents_graphml/9/9995ef30-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.75
+ 100.64.23.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749991
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9995ef30-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/99a2bdc0-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/9/99a2bdc0-35bb-11ee-95a2-5f9786093780.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5dc7569efaa257535b06cd388905df93893cc20f
--- /dev/null
+++ b/graph/incidents_graphml/9/99a2bdc0-35bb-11ee-95a2-5f9786093780.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.223
+ 100.64.66.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.184
+ 100.64.77.184
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.167
+ 100.64.18.167
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1691479035
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99a2bdc0-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479035
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99a2bdc0-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479035
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99a2bdc0-35bb-11ee-95a2-5f9786093780
+
+
+ INCIDENT_LINK
+ 1691479035
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99a2bdc0-35bb-11ee-95a2-5f9786093780
+
+
+
diff --git a/graph/incidents_graphml/9/99a65ec0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/99a65ec0-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..86b4ad688e8afb267831d5115f61afd2af41c49d
--- /dev/null
+++ b/graph/incidents_graphml/9/99a65ec0-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.30
+ HOST-11232
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090007
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99a65ec0-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/99af64c0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/99af64c0-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a76c03fdf78e313f07cd57eb68b24f8ec1f29260
--- /dev/null
+++ b/graph/incidents_graphml/9/99af64c0-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.23
+ 100.64.8.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.59
+ 100.64.73.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.60
+ 100.64.73.60
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.10.143
+ 100.64.10.143
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661144110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99af64c0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99af64c0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99af64c0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99af64c0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99af64c0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144110
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99af64c0-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/99b2be70-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/99b2be70-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fbadfa40bc7f606ec9a1ee43f3bcf3c945f26497
--- /dev/null
+++ b/graph/incidents_graphml/9/99b2be70-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.20.70
+ 100.64.20.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360826
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99b2be70-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/99b63a00-3a82-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/99b63a00-3a82-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..82b1262da4673b1422898553c57854c1bcc9bd31
--- /dev/null
+++ b/graph/incidents_graphml/9/99b63a00-3a82-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.89
+ 100.64.68.89
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.23
+ 100.64.68.23
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1692004309
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99b63a00-3a82-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692004309
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99b63a00-3a82-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/9/99c18b80-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/99c18b80-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..32b6d2819286c7261585becdc8f652b0b9c4950d
--- /dev/null
+++ b/graph/incidents_graphml/9/99c18b80-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.70
+ 100.64.20.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360826
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99c18b80-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/99d32ce0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/99d32ce0-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8ab532854cc635a5fcc1fe30ea7bc42ae92d3ac
--- /dev/null
+++ b/graph/incidents_graphml/9/99d32ce0-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.105
+ 100.64.14.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773018
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99d32ce0-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/99dd56d0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/99dd56d0-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3c0d14f37c5f296af3837d8cf635f0388d9f3614
--- /dev/null
+++ b/graph/incidents_graphml/9/99dd56d0-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.108
+ 100.64.76.108
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659714745
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99dd56d0-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/99e3f5c0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/99e3f5c0-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..47928da0ef30c36a574396a6f4633ef4c47f1a3e
--- /dev/null
+++ b/graph/incidents_graphml/9/99e3f5c0-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.105
+ 100.64.14.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773018
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99e3f5c0-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/99e5bd90-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/9/99e5bd90-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b92ebb65c95bb867b42d5ff42c180ef2e695200c
--- /dev/null
+++ b/graph/incidents_graphml/9/99e5bd90-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.160
+ 100.64.7.160
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1695254740
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 99e5bd90-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/9/99e76890-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/99e76890-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..11decd64ce570ca39519c94e6d5657534cdb5f9a
--- /dev/null
+++ b/graph/incidents_graphml/9/99e76890-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.34.103.21
+ 10.34.103.21
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057525
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99e76890-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057525
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99e76890-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/99e8a3c0-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/9/99e8a3c0-5812-11ee-83e4-f12d78181e73.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..289b4b872e652b729a84de72b1f9fee1944ffafb
--- /dev/null
+++ b/graph/incidents_graphml/9/99e8a3c0-5812-11ee-83e4-f12d78181e73.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.14
+ 100.64.68.14
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.7.160
+ 100.64.7.160
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1695254740
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99e8a3c0-5812-11ee-83e4-f12d78181e73
+
+
+
diff --git a/graph/incidents_graphml/9/99ee94e0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/99ee94e0-14d6-11ed-9c5d-cfc137bdc6da.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2c6f0574a603037e423fa70466e2894c25f8671
--- /dev/null
+++ b/graph/incidents_graphml/9/99ee94e0-14d6-11ed-9c5d-cfc137bdc6da.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.108
+ 100.64.76.108
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659714745
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99ee94e0-14d6-11ed-9c5d-cfc137bdc6da
+
+
+
diff --git a/graph/incidents_graphml/9/99f20c70-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/9/99f20c70-70e6-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44b56f6dff86a523de18ba7a781865dbf9d92b2f
--- /dev/null
+++ b/graph/incidents_graphml/9/99f20c70-70e6-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.80
+ HOST-11480
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.22
+ 100.64.68.22
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.81
+ 100.64.68.81
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1697984622
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99f20c70-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984622
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99f20c70-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984622
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99f20c70-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984622
+ malicious
+ 0.7
+ 0.6625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 99f20c70-70e6-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/9/99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e102a938f62ea897e8dbf848048233f7b769771f
--- /dev/null
+++ b/graph/incidents_graphml/9/99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.78.73
+ 100.64.78.73
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.240
+ 100.64.71.240
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.179
+ USER-0015-1622.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1776.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.12
+ 100.64.9.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.48.120
+ 100.64.48.120
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+ INCIDENT_LINK
+ 1657051006
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b
+
+
+
diff --git a/graph/incidents_graphml/9/9a0d5fc0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9a0d5fc0-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b3c377fd38e200b0c86742db9143ebf346429d72
--- /dev/null
+++ b/graph/incidents_graphml/9/9a0d5fc0-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.93.199
+ 192.168.93.199
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.97
+ 100.64.72.97
+ ["Exploiting Target","Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a0d5fc0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480587
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a0d5fc0-238e-11ee-8f53-17c8a7373bd3
+
+
+
diff --git a/graph/incidents_graphml/9/9a101070-ec22-11ec-a400-fd786ffd5fbb.graphml b/graph/incidents_graphml/9/9a101070-ec22-11ec-a400-fd786ffd5fbb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1bf2bf8325f89ae3eaa6b42b8f37bf349a21672
--- /dev/null
+++ b/graph/incidents_graphml/9/9a101070-ec22-11ec-a400-fd786ffd5fbb.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.20
+ 100.64.71.20
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.21
+ USER-0015-1611.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.22
+ 100.64.71.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655239389
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a101070-ec22-11ec-a400-fd786ffd5fbb
+
+
+ INCIDENT_LINK
+ 1655239389
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a101070-ec22-11ec-a400-fd786ffd5fbb
+
+
+ INCIDENT_LINK
+ 1655239389
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a101070-ec22-11ec-a400-fd786ffd5fbb
+
+
+ INCIDENT_LINK
+ 1655239389
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a101070-ec22-11ec-a400-fd786ffd5fbb
+
+
+
diff --git a/graph/incidents_graphml/9/9a181740-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/9a181740-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bae5099f5bd7cc1b7ff0a1d8c7b430fa3c23c11e
--- /dev/null
+++ b/graph/incidents_graphml/9/9a181740-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.191
+ 100.64.80.191
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.92
+ USER-0015-1614.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a181740-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446836
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a181740-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3518833b790882343a51f3033f5465f7a6a396bb
--- /dev/null
+++ b/graph/incidents_graphml/9/9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.38.202
+ 100.64.38.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389534
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/9a1be420-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9a1be420-085b-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..468e62657b1b034c0f4b9d2a544e519836539327
--- /dev/null
+++ b/graph/incidents_graphml/9/9a1be420-085b-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.196
+ 100.64.14.196
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714637499
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a1be420-085b-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/9/9a26d960-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9a26d960-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5c03c5e4147e343fb7ec51c6a4920eaf162dfb8a
--- /dev/null
+++ b/graph/incidents_graphml/9/9a26d960-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.241
+ 100.64.11.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090008
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a26d960-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9a2f3740-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9a2f3740-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0472959054a03ce0a040a2b8566fe36c5ac9d331
--- /dev/null
+++ b/graph/incidents_graphml/9/9a2f3740-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.248
+ 100.64.33.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224018
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a2f3740-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d6f9383d422c90e2fe7caf3872bb7bdb43fd2b3e
--- /dev/null
+++ b/graph/incidents_graphml/9/9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.38.202
+ 100.64.38.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689389534
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe
+
+
+
diff --git a/graph/incidents_graphml/9/9a404e40-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9a404e40-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a1f7e3489cc2d187227f9f51237547dd382c333d
--- /dev/null
+++ b/graph/incidents_graphml/9/9a404e40-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.248
+ 100.64.33.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224018
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a404e40-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9a4673c0-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9a4673c0-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1da07780b6e0248e6b51007a2506a891cdcd0379
--- /dev/null
+++ b/graph/incidents_graphml/9/9a4673c0-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.114
+ 100.64.33.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9a4673c0-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/9a4791f0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/9/9a4791f0-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e52f67c0020df63240cae395c4feac52823b94f6
--- /dev/null
+++ b/graph/incidents_graphml/9/9a4791f0-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.120
+ 100.64.9.120
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.104
+ USER-0015-1653.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9a4791f0-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9a4791f0-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/9/9a4d7af0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a4d7af0-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a265a6d65b2c5a6d0796faa89c3e7a3aaa0fc1b7
--- /dev/null
+++ b/graph/incidents_graphml/9/9a4d7af0-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.190
+ 100.64.35.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a4d7af0-6606-11ee-962d-dd0cd806580f
+
+
+ INCIDENT_LINK
+ 1696788904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a4d7af0-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9a4f0c00-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/9/9a4f0c00-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ed8061bb8dd36b3cec183b66b498f79d2e72afe2
--- /dev/null
+++ b/graph/incidents_graphml/9/9a4f0c00-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.106
+ 100.64.73.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.67
+ 100.64.72.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a4f0c00-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a4f0c00-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a4f0c00-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a4f0c00-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/9/9a5372d0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a5372d0-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b1acbf09df0543721c048301a9891f46222e5765
--- /dev/null
+++ b/graph/incidents_graphml/9/9a5372d0-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.77
+ 100.64.23.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a5372d0-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9a540d10-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9a540d10-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..535f934ea9fce1d90f84bbb03a6caacaeddccb00
--- /dev/null
+++ b/graph/incidents_graphml/9/9a540d10-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.171.160.92
+ 10.171.160.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a540d10-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a540d10-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/9a562b30-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9a562b30-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bd492b1f4c1136fa032d805a3abf3b8e08919f0
--- /dev/null
+++ b/graph/incidents_graphml/9/9a562b30-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,647 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.103
+ 100.64.8.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.225
+ 100.64.29.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.83
+ 100.64.36.83
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.185
+ 100.64.37.185
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.194
+ 100.64.26.194
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.186
+ 100.64.37.186
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.105
+ 100.64.7.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.140
+ 100.64.14.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.187
+ 100.64.37.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.248
+ 100.64.8.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.122
+ 100.64.9.122
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.247
+ 100.64.6.247
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.15
+ 100.64.16.15
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.127
+ 100.64.35.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.188
+ 100.64.37.188
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293001
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a562b30-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/9a572250-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/9/9a572250-f477-11ec-a9fa-937f4b53edcd.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..67d1e48f8747f1c978986d83e97a0705eb760412
--- /dev/null
+++ b/graph/incidents_graphml/9/9a572250-f477-11ec-a9fa-937f4b53edcd.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.71.226
+ 100.64.71.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a572250-f477-11ec-a9fa-937f4b53edcd
+
+
+ INCIDENT_LINK
+ 1656155506
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a572250-f477-11ec-a9fa-937f4b53edcd
+
+
+
diff --git a/graph/incidents_graphml/9/9a5bae30-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9a5bae30-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..050de3ba2a37a374e5a7d9e3e305d82600920d2c
--- /dev/null
+++ b/graph/incidents_graphml/9/9a5bae30-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.8.3.55
+ 10.8.3.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a5bae30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057526
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a5bae30-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/9a5e91f0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a5e91f0-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..68a4da0a949c8266d1947bc9df12c1f010fc092a
--- /dev/null
+++ b/graph/incidents_graphml/9/9a5e91f0-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.190
+ 100.64.35.190
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9a5e91f0-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8215697a0125bce55a33af442ec98f0f3b0b883a
--- /dev/null
+++ b/graph/incidents_graphml/9/9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.77
+ 100.64.23.77
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9a72dd40-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a72dd40-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0af7bb2de0de885917126aca7ddd092ca0ba511e
--- /dev/null
+++ b/graph/incidents_graphml/9/9a72dd40-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.194
+ 100.64.35.194
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a72dd40-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9a786340-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/9/9a786340-182d-11ee-88ad-19cfc5af29bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..903d7866c2afb2421226e06954c9b286e36067ee
--- /dev/null
+++ b/graph/incidents_graphml/9/9a786340-182d-11ee-88ad-19cfc5af29bb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 192.168.170.235
+ 192.168.170.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.186
+ 100.64.77.186
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1688229464
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a786340-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229464
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a786340-182d-11ee-88ad-19cfc5af29bb
+
+
+
diff --git a/graph/incidents_graphml/9/9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..df48267ea6c91eabb609b64b9ed8f9b6f1a1e224
--- /dev/null
+++ b/graph/incidents_graphml/9/9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9a8098e0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a8098e0-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..be905555f862fe0f2829433a5e8820fef22239f6
--- /dev/null
+++ b/graph/incidents_graphml/9/9a8098e0-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.194
+ 100.64.35.194
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788904
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9a8098e0-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9a859bd0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9a859bd0-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..539e3bad707dc36c9c866530b8f0e8e594bf3086
--- /dev/null
+++ b/graph/incidents_graphml/9/9a859bd0-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.175
+ 100.64.39.175
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274727
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a859bd0-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9a8fc620-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9a8fc620-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a95876ef89e489fffd594f9aaf6bb5b8b33f9694
--- /dev/null
+++ b/graph/incidents_graphml/9/9a8fc620-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.58.212
+ 100.64.58.212
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9a8fc620-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/9a91b450-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a91b450-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad82472c4a13f194ef35f7b75e3e5e53adadbada
--- /dev/null
+++ b/graph/incidents_graphml/9/9a91b450-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.79
+ 100.64.23.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749993
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a91b450-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9a9be2f0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9a9be2f0-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5f3b003b0978cb1af8ff8da05eae8fc1ea1e5cca
--- /dev/null
+++ b/graph/incidents_graphml/9/9a9be2f0-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.177
+ 100.64.39.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274727
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a9be2f0-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/9/9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80ab466eaf4762a49b378c1e604284d0152c0426
--- /dev/null
+++ b/graph/incidents_graphml/9/9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.11.234
+ 100.64.11.234
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.161
+ 100.64.72.161
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1686806971
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+ INCIDENT_LINK
+ 1686806971
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38
+
+
+
diff --git a/graph/incidents_graphml/9/9a9ef560-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9a9ef560-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d8fe2520e1755ca2805aeec765e16bc7b54ae503
--- /dev/null
+++ b/graph/incidents_graphml/9/9a9ef560-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.81
+ 100.64.73.81
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.41.218
+ 100.64.41.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370387
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a9ef560-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370387
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a9ef560-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/9/9a9f9a50-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/9/9a9f9a50-182d-11ee-88ad-19cfc5af29bb.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2745a46ea2d684462856f38ae2f8e152dbd4479
--- /dev/null
+++ b/graph/incidents_graphml/9/9a9f9a50-182d-11ee-88ad-19cfc5af29bb.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.72
+ 100.64.72.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.179
+ 100.64.75.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1688229464
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a9f9a50-182d-11ee-88ad-19cfc5af29bb
+
+
+ INCIDENT_LINK
+ 1688229464
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9a9f9a50-182d-11ee-88ad-19cfc5af29bb
+
+
+
diff --git a/graph/incidents_graphml/9/9aa040e0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9aa040e0-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4260c021abc5f30310bb2a03668b4bf789453908
--- /dev/null
+++ b/graph/incidents_graphml/9/9aa040e0-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.58.212
+ 100.64.58.212
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773020
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9aa040e0-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/9aa53c50-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9aa53c50-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..49847e5d40df31106e9df7c46f2bc0e2ce515ccd
--- /dev/null
+++ b/graph/incidents_graphml/9/9aa53c50-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.81
+ 100.64.23.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749993
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9aa53c50-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9aa64180-3d5b-11ef-86a6-4db713805853.graphml b/graph/incidents_graphml/9/9aa64180-3d5b-11ef-86a6-4db713805853.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..01eb975c672d4a8a20ce2cd0536b83010ffd97d4
--- /dev/null
+++ b/graph/incidents_graphml/9/9aa64180-3d5b-11ef-86a6-4db713805853.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.182
+ 100.64.42.182
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720464911
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9aa64180-3d5b-11ef-86a6-4db713805853
+
+
+ INCIDENT_LINK
+ 1720464911
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9aa64180-3d5b-11ef-86a6-4db713805853
+
+
+
diff --git a/graph/incidents_graphml/9/9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5.graphml b/graph/incidents_graphml/9/9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7a0216706e2fac40846cfbe1e76c6da84a1ee33f
--- /dev/null
+++ b/graph/incidents_graphml/9/9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.3
+ 100.64.31.3
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1696094408
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+
diff --git a/graph/incidents_graphml/9/9aafecb0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9aafecb0-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..37b09f97f2dda5e6d56149c3d91cf7640ddf2f23
--- /dev/null
+++ b/graph/incidents_graphml/9/9aafecb0-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.252
+ 100.64.31.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171288
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9aafecb0-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9ab0c650-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9ab0c650-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..013d1b337d8a3934401780ddd6ebe6b64a15a797
--- /dev/null
+++ b/graph/incidents_graphml/9/9ab0c650-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.187
+ 100.64.33.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398686
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ab0c650-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/9aba23e0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9aba23e0-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d2579ac35517c51d986cce4377d0697a5ee4176a
--- /dev/null
+++ b/graph/incidents_graphml/9/9aba23e0-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.81
+ 100.64.23.81
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749993
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9aba23e0-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9abb51d0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9abb51d0-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..919cf76459658148498077a9169df9588663a566
--- /dev/null
+++ b/graph/incidents_graphml/9/9abb51d0-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.39.177
+ 100.64.39.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274727
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9abb51d0-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9abbf110-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9abbf110-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..71af799ea388e51ed57aefca5145d10f391ee928
--- /dev/null
+++ b/graph/incidents_graphml/9/9abbf110-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.253
+ 100.64.13.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9abbf110-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9abdcf60-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9abdcf60-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b2a4588258beb6e1078a85e22061aa66fc6e028c
--- /dev/null
+++ b/graph/incidents_graphml/9/9abdcf60-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.31.252
+ 100.64.31.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171288
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9abdcf60-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9abe8580-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9abe8580-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f82bbfafca8ca948aebfd99d0530cf47fba2b2e8
--- /dev/null
+++ b/graph/incidents_graphml/9/9abe8580-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,799 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.34
+ 100.64.67.34
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.85
+ 100.64.63.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.35
+ 100.64.67.35
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.59
+ 100.64.30.59
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.2.136
+ 100.64.2.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.54.163
+ 100.64.54.163
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.53
+ 100.64.29.53
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.178
+ USER-0015-1483.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.75
+ 100.64.7.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.58
+ 100.64.13.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.46
+ USER-0015-1484.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.79
+ USER-0015-1485.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.158.1
+ 172.29.158.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.36
+ 100.64.67.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.195
+ 100.64.27.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.222
+ 100.64.37.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.37
+ 100.64.67.37
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.201
+ 100.64.64.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+ INCIDENT_LINK
+ 1687090009
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9abe8580-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9ac51e60-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9ac51e60-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ac1e6a2c2ba9da286adba6e4c37a4f9390106817
--- /dev/null
+++ b/graph/incidents_graphml/9/9ac51e60-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.161.239.168
+ 10.161.239.168
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057527
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ac51e60-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057527
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ac51e60-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/9acb3350-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9acb3350-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fa505bf24a89bebc5d66dc953c93e45c1a695c65
--- /dev/null
+++ b/graph/incidents_graphml/9/9acb3350-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.253
+ 100.64.13.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9acb3350-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9acc3d90-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9acc3d90-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..439dcb04b232590acd182a0bc8ceed515ce1b68b
--- /dev/null
+++ b/graph/incidents_graphml/9/9acc3d90-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.187
+ 100.64.33.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398686
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9acc3d90-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/9ad4f450-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9ad4f450-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c95f8c39549d3162ee55f199e1436895dee3a341
--- /dev/null
+++ b/graph/incidents_graphml/9/9ad4f450-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.45
+ 100.64.28.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ad4f450-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9ad80560-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9ad80560-73b4-11ee-a6ae-7f5088e679a8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..808706f7174dcd8fbae04b91cc2d9a3d3b20ebf9
--- /dev/null
+++ b/graph/incidents_graphml/9/9ad80560-73b4-11ee-a6ae-7f5088e679a8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.161
+ 100.64.33.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.200.243
+ 172.30.200.243
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698293002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ad80560-73b4-11ee-a6ae-7f5088e679a8
+
+
+ INCIDENT_LINK
+ 1698293002
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ad80560-73b4-11ee-a6ae-7f5088e679a8
+
+
+
diff --git a/graph/incidents_graphml/9/9ad8a0d0-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9ad8a0d0-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12d6e299ff03aebaf2eff549f8286a4a6f8a40f8
--- /dev/null
+++ b/graph/incidents_graphml/9/9ad8a0d0-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.55
+ 100.64.56.55
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ad8a0d0-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9addb170-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9addb170-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..81e3bd7093f23fb838f1a266b3ace8dab7b3b53e
--- /dev/null
+++ b/graph/incidents_graphml/9/9addb170-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.83
+ 100.64.23.83
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749994
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9addb170-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9ae7bc00-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9ae7bc00-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edfff763686e7123c34b343930c57e3d1d456a10
--- /dev/null
+++ b/graph/incidents_graphml/9/9ae7bc00-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.56.55
+ 100.64.56.55
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360828
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ae7bc00-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9aea02f0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9aea02f0-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..64fa6c961f4f39afc5f03d413ab1470de7de6eba
--- /dev/null
+++ b/graph/incidents_graphml/9/9aea02f0-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.45
+ 100.64.28.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274728
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9aea02f0-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9af09f80-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/9af09f80-f340-11ec-a343-c72f25ca2eb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..72c8a7c4846544dc8dc8fa83af0aeaf85e771189
--- /dev/null
+++ b/graph/incidents_graphml/9/9af09f80-f340-11ec-a343-c72f25ca2eb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.99
+ 100.64.77.99
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656021934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9af09f80-f340-11ec-a343-c72f25ca2eb2
+
+
+ INCIDENT_LINK
+ 1656021934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9af09f80-f340-11ec-a343-c72f25ca2eb2
+
+
+
diff --git a/graph/incidents_graphml/9/9af151c0-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9af151c0-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e4ab71b8dc5ebe8158118ce6f4c0de7378adf815
--- /dev/null
+++ b/graph/incidents_graphml/9/9af151c0-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.244
+ 100.64.52.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398686
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9af151c0-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/9af2f460-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9af2f460-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ca23f67d95011a3da0242a32de9824588b134a9
--- /dev/null
+++ b/graph/incidents_graphml/9/9af2f460-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.192
+ 100.64.72.192
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.193
+ 100.64.72.193
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687192659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9af2f460-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192659
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9af2f460-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/9af47010-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/9af47010-f340-11ec-a343-c72f25ca2eb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d92bd224a6c616dc4e9e40a098b8cb9837a7df4f
--- /dev/null
+++ b/graph/incidents_graphml/9/9af47010-f340-11ec-a343-c72f25ca2eb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.100
+ USER-0015-1753.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.101
+ USER-0015-1754.example.internal
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656021934
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9af47010-f340-11ec-a343-c72f25ca2eb2
+
+
+ INCIDENT_LINK
+ 1656021934
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9af47010-f340-11ec-a343-c72f25ca2eb2
+
+
+
diff --git a/graph/incidents_graphml/9/9af75640-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/9af75640-f340-11ec-a343-c72f25ca2eb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b53dc9e0a5e7ffa2b5fe23315198b4e67962694d
--- /dev/null
+++ b/graph/incidents_graphml/9/9af75640-f340-11ec-a343-c72f25ca2eb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.121
+ 100.64.43.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656021934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9af75640-f340-11ec-a343-c72f25ca2eb2
+
+
+ INCIDENT_LINK
+ 1656021934
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9af75640-f340-11ec-a343-c72f25ca2eb2
+
+
+
diff --git a/graph/incidents_graphml/9/9af9e470-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9af9e470-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2be52f7d56e2463f1f951bc53dcd9c11aa210d15
--- /dev/null
+++ b/graph/incidents_graphml/9/9af9e470-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.4
+ 100.64.29.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360828
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9af9e470-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9b057520-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/9b057520-79e2-11ee-9fa1-09d380781a0d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b9cac57406c0cda5655f1b24777c67ece3e2b658
--- /dev/null
+++ b/graph/incidents_graphml/9/9b057520-79e2-11ee-9fa1-09d380781a0d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.76
+ 100.64.7.76
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1698972466
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b057520-79e2-11ee-9fa1-09d380781a0d
+
+
+
diff --git a/graph/incidents_graphml/9/9b06f070-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/9/9b06f070-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f3914f95ea4c9cc624a33cdd0d4dd88366fafca
--- /dev/null
+++ b/graph/incidents_graphml/9/9b06f070-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.240
+ 100.64.77.240
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690855408
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b06f070-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/9/9b0926b0-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9b0926b0-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3745da10e4f2826579f67366abe304740446b202
--- /dev/null
+++ b/graph/incidents_graphml/9/9b0926b0-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.4
+ 100.64.29.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.87625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360828
+ malicious
+ 0.87625
+ 0.87625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b0926b0-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9b0f8820-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9b0f8820-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e2eadc7635b034113c38771b7d2d32948c4dd26a
--- /dev/null
+++ b/graph/incidents_graphml/9/9b0f8820-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.244
+ 100.64.52.244
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398686
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9b0f8820-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/9b1cfac0-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/9/9b1cfac0-09ab-11ef-a326-59a1bcca7fdf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1f243dd62a5c65c3043ec46414be795ef2f8b3d1
--- /dev/null
+++ b/graph/incidents_graphml/9/9b1cfac0-09ab-11ef-a326-59a1bcca7fdf.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.105
+ 100.64.31.105
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.45
+ 100.64.49.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.46
+ 100.64.49.46
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714781811
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781811
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781811
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781811
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781811
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf
+
+
+ INCIDENT_LINK
+ 1714781811
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf
+
+
+
diff --git a/graph/incidents_graphml/9/9b2593a0-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/9/9b2593a0-3cab-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6b4b4995f1ffb2feb087df3897fafb495e4cf639
--- /dev/null
+++ b/graph/incidents_graphml/9/9b2593a0-3cab-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.17.160.55
+ USER-0015-1988.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.87.241
+ 100.64.87.241
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720389321
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b2593a0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720389321
+ malicious
+ 0.7
+ 0.4375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b2593a0-3cab-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/9/9b291e70-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/9/9b291e70-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e021f5846fcdb4074323026c8a7289a21431e3ba
--- /dev/null
+++ b/graph/incidents_graphml/9/9b291e70-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.2
+ 100.64.77.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.240
+ 100.64.77.240
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690855408
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9b291e70-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/9/9b3257c0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9b3257c0-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8c165bd7fe3796f3dd25cd7474742680a080aca
--- /dev/null
+++ b/graph/incidents_graphml/9/9b3257c0-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.146.218.32
+ 10.146.218.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.98
+ 100.64.72.98
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480589
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b3257c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480589
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b3257c0-238e-11ee-8f53-17c8a7373bd3
+
+
+
diff --git a/graph/incidents_graphml/9/9b400350-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9b400350-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..75d5b3bbee4967196f47acf4b84f88be1c122b88
--- /dev/null
+++ b/graph/incidents_graphml/9/9b400350-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.218
+ 100.64.36.218
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b400350-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/9b404bb0-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/9/9b404bb0-9eb7-11ee-9861-037a800baf91.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..36331b7bb0daad0f20e4d68ad17302e179723e4d
--- /dev/null
+++ b/graph/incidents_graphml/9/9b404bb0-9eb7-11ee-9861-037a800baf91.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.70
+ 100.64.8.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ INCIDENT_LINK
+ 1703022191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b404bb0-9eb7-11ee-9861-037a800baf91
+
+
+
diff --git a/graph/incidents_graphml/9/9b44d580-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9b44d580-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..76c180384901b01d5cef0cf14bdf85379f5bc164
--- /dev/null
+++ b/graph/incidents_graphml/9/9b44d580-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.153
+ 100.64.8.153
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315925
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b44d580-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9b4fbac0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9b4fbac0-dc1d-11ee-a712-878bc23f81d5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b7a6273151c0d0e054a00548c395cd10fc4cbe23
--- /dev/null
+++ b/graph/incidents_graphml/9/9b4fbac0-dc1d-11ee-a712-878bc23f81d5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.218
+ 100.64.36.218
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1709773021
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b4fbac0-dc1d-11ee-a712-878bc23f81d5
+
+
+
diff --git a/graph/incidents_graphml/9/9b5329b0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9b5329b0-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1d29367e247c43ec7dd625fbfb15c7584e22cffd
--- /dev/null
+++ b/graph/incidents_graphml/9/9b5329b0-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,373 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.61
+ 100.64.73.61
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.253
+ 100.64.70.253
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.1.49
+ 100.64.1.49
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.30.26
+ 100.64.30.26
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.62
+ 100.64.73.62
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.14.22
+ 100.64.14.22
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.63
+ 100.64.73.63
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.3.124
+ 100.64.3.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.64
+ 100.64.73.64
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.167
+ 100.64.72.167
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b5329b0-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/9b533770-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/9/9b533770-9eb7-11ee-9861-037a800baf91.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27d72a49d4ecf1ac49184d2a60d54c0df1f8bc46
--- /dev/null
+++ b/graph/incidents_graphml/9/9b533770-9eb7-11ee-9861-037a800baf91.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 100.64.6.199
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.8.70
+ 100.64.8.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1703022191
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b533770-9eb7-11ee-9861-037a800baf91
+
+
+
diff --git a/graph/incidents_graphml/9/9b53e7b0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9b53e7b0-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..00fbebcb01affe5df3c8ff880656688fb3c6e17a
--- /dev/null
+++ b/graph/incidents_graphml/9/9b53e7b0-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.42
+ 100.64.67.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b53e7b0-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9b54fe70-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9b54fe70-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b65a22788f3bfdfb2250d6f5375d730f8396c653
--- /dev/null
+++ b/graph/incidents_graphml/9/9b54fe70-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,171 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.31.217
+ 100.64.31.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.34.250
+ 100.64.34.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.16.220
+ 100.64.16.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.983125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.66
+ USER-0015-1649.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144113
+ malicious
+ 0.983125
+ 0.983125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b54fe70-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ddff3389d385b9863938bcb4bb2128ff55e81bcf
--- /dev/null
+++ b/graph/incidents_graphml/9/9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,547 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.66.248
+ 100.64.66.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.23.117
+ 172.26.23.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.249
+ 100.64.66.249
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.250
+ 100.64.66.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.251
+ 100.64.66.251
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.252
+ 100.64.66.252
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.41
+ 100.64.20.41
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.222
+ 100.64.9.222
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.25.58
+ 100.64.25.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.57.200
+ 100.64.57.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.253
+ 100.64.66.253
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.254
+ 100.64.66.254
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.255
+ 100.64.66.255
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766010
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/9b6211f0-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9b6211f0-8544-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a469563923e78282ec343101d18ff97aa6355c7
--- /dev/null
+++ b/graph/incidents_graphml/9/9b6211f0-8544-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.119
+ 100.64.39.119
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700224020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b6211f0-8544-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f721471901870a83dc55bb1c5733ca53d99cf687
--- /dev/null
+++ b/graph/incidents_graphml/9/9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.209
+ 100.64.80.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1656920012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd86396943df32970312cb9826d6b683a252e55e
--- /dev/null
+++ b/graph/incidents_graphml/9/9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.209
+ 100.64.80.209
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656920012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9b6cd220-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b6cd220-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ec293f5625731547bdb174e91f5bb7c33b46cf2e
--- /dev/null
+++ b/graph/incidents_graphml/9/9b6cd220-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.123
+ 100.64.77.123
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320899
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b6cd220-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9b6ec2b0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9b6ec2b0-0dd0-11ee-9fca-b36927191846.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..551b2c0e6c75faa747a87ce7e71f8ae1869548dc
--- /dev/null
+++ b/graph/incidents_graphml/9/9b6ec2b0-0dd0-11ee-9fca-b36927191846.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.42
+ 100.64.67.42
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687090010
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b6ec2b0-0dd0-11ee-9fca-b36927191846
+
+
+
diff --git a/graph/incidents_graphml/9/9b70f290-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9b70f290-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6dfc1bef5226a652bd123039b6a715150872df7a
--- /dev/null
+++ b/graph/incidents_graphml/9/9b70f290-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.66.248
+ 100.64.66.248
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766011
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9b70f290-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/9b71fa90-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9b71fa90-9947-11ee-986d-1bbc30865dce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d612ef37b74074dde32a09dcebba3313e5148b27
--- /dev/null
+++ b/graph/incidents_graphml/9/9b71fa90-9947-11ee-986d-1bbc30865dce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.127
+ 100.64.36.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702424332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b71fa90-9947-11ee-986d-1bbc30865dce
+
+
+
diff --git a/graph/incidents_graphml/9/9b72ec90-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9b72ec90-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cea297984d7dcca5b91bd1b99b3555aa815c6992
--- /dev/null
+++ b/graph/incidents_graphml/9/9b72ec90-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,221 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.190
+ 100.64.64.190
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.139
+ USER-0015-1462.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.47
+ 100.64.33.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.26.101
+ 100.64.26.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.191
+ 100.64.64.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738287
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b72ec90-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/9/9b73fe10-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b73fe10-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb1baf33d61c79bedd6a5f43e2cbe6f29ae52de3
--- /dev/null
+++ b/graph/incidents_graphml/9/9b73fe10-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.123
+ 100.64.77.123
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320899
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b73fe10-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9b788160-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9b788160-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e33de99d4d89ea0e16c6c2cccb7a98700a7512d
--- /dev/null
+++ b/graph/incidents_graphml/9/9b788160-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.23.45
+ 100.64.23.45
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139298
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b788160-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/9/9b78e010-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b78e010-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e06a1eae3ebd07784ab1e6e2950df9292338ad19
--- /dev/null
+++ b/graph/incidents_graphml/9/9b78e010-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.221
+ 100.64.76.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320899
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b78e010-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9b7ca6a0-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/9/9b7ca6a0-2c8a-11ed-be76-c750f0345c87.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ce1a0819d47325f8ec3049cd8441fa6405da168e
--- /dev/null
+++ b/graph/incidents_graphml/9/9b7ca6a0-2c8a-11ed-be76-c750f0345c87.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.75
+ 100.64.75.75
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.226
+ 100.64.1.226
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.76
+ 100.64.75.76
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1662320934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b7ca6a0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b7ca6a0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b7ca6a0-2c8a-11ed-be76-c750f0345c87
+
+
+ INCIDENT_LINK
+ 1662320934
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b7ca6a0-2c8a-11ed-be76-c750f0345c87
+
+
+
diff --git a/graph/incidents_graphml/9/9b7f4100-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9b7f4100-9947-11ee-986d-1bbc30865dce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15e3ea66328b6eff32e47045ec93416bd3f69716
--- /dev/null
+++ b/graph/incidents_graphml/9/9b7f4100-9947-11ee-986d-1bbc30865dce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.36.127
+ 100.64.36.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702424332
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9b7f4100-9947-11ee-986d-1bbc30865dce
+
+
+
diff --git a/graph/incidents_graphml/9/9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c9759cefb966e5cd4bdc9b97a1dd9beb477ad8b
--- /dev/null
+++ b/graph/incidents_graphml/9/9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.91
+ USER-0015-1718.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9b814480-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b814480-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6180d08003d6fa0641d43c68afd6a917e903076e
--- /dev/null
+++ b/graph/incidents_graphml/9/9b814480-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.89453125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.76.221
+ 100.64.76.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659320899
+ malicious
+ 0.89453125
+ 0.89453125
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b814480-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/9/9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..979b6f1c2d00902f8cbdbabd57c250c9fd077d3e
--- /dev/null
+++ b/graph/incidents_graphml/9/9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.127
+ 100.64.81.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.72.160
+ HOST-13816
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681490662
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+ INCIDENT_LINK
+ 1681490662
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/9/9b8b0cd0-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/9/9b8b0cd0-2122-11ee-9a61-05dd24aa353e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0d63550b2c5ed6a3cfaa7aed6e87f0ace47185e3
--- /dev/null
+++ b/graph/incidents_graphml/9/9b8b0cd0-2122-11ee-9a61-05dd24aa353e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.1
+ 100.64.18.1
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.69.129
+ 100.64.69.129
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1689214301
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b8b0cd0-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214301
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b8b0cd0-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214301
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b8b0cd0-2122-11ee-9a61-05dd24aa353e
+
+
+ INCIDENT_LINK
+ 1689214301
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b8b0cd0-2122-11ee-9a61-05dd24aa353e
+
+
+
diff --git a/graph/incidents_graphml/9/9b8c1570-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9b8c1570-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1403a3a95dba1208c5022be3e9cd2e09f2996b6
--- /dev/null
+++ b/graph/incidents_graphml/9/9b8c1570-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.196
+ 100.64.35.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788906
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b8c1570-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c2cd879f5b1582f9426208171329e508fe610a9e
--- /dev/null
+++ b/graph/incidents_graphml/9/9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.91
+ USER-0015-1718.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9b942e30-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9b942e30-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8d4d32c84230dd136a5c8227255613e73ede7968
--- /dev/null
+++ b/graph/incidents_graphml/9/9b942e30-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.250
+ 100.64.73.250
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.73.92
+ 100.64.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.208
+ 100.64.82.208
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.129
+ 100.64.72.129
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.82.209
+ 100.64.82.209
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b942e30-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/9b96c640-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9b96c640-a979-11ed-965d-a1a801bb61f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..98d492160deb6b27e6d0b357ddc354e97fb4e982
--- /dev/null
+++ b/graph/incidents_graphml/9/9b96c640-a979-11ed-965d-a1a801bb61f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.99.139.57
+ 10.99.139.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 10.185.63.242
+ 10.185.63.242
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b96c640-a979-11ed-965d-a1a801bb61f1
+
+
+ INCIDENT_LINK
+ 1676057528
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9b96c640-a979-11ed-965d-a1a801bb61f1
+
+
+
diff --git a/graph/incidents_graphml/9/9b979f00-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/9/9b979f00-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e3aba183a9c6790ad03280195a9f8912ed74a6ec
--- /dev/null
+++ b/graph/incidents_graphml/9/9b979f00-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.150
+ 100.64.35.150
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548914
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b979f00-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/9/9b991240-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b991240-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b8d0672bc7102f83af3bc5c3accbb6c69a72ff52
--- /dev/null
+++ b/graph/incidents_graphml/9/9b991240-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.68.39
+ USER-0015-1756.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320899
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9b991240-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9b9cb740-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9b9cb740-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69a127fcd2baa7d6f9ef1b2abbec915022e73278
--- /dev/null
+++ b/graph/incidents_graphml/9/9b9cb740-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.196
+ 100.64.35.196
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788906
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9b9cb740-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9ba12890-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9ba12890-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..de95df3920c6852fa38c9eaeea4615633c99db9f
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba12890-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.68.39
+ USER-0015-1756.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320900
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ba12890-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9ba17330-2bbc-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/9/9ba17330-2bbc-11ef-b37a-07248b6407de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0df32a4f95f69d9bcae5539130962503c3519d9b
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba17330-2bbc-11ef-b37a-07248b6407de.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.66
+ USER-0015-1248.example.internal
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.67
+ USER-0015-1242.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.68
+ 100.64.24.68
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ba17330-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ba17330-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ba17330-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ba17330-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ba17330-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ba17330-2bbc-11ef-b37a-07248b6407de
+
+
+
diff --git a/graph/incidents_graphml/9/9ba17870-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9ba17870-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58f03f6632fa458074ed88a774f8cf9238a49fc3
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba17870-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.8
+ 100.64.67.8
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766011
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ba17870-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766011
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ba17870-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/9ba435c0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9ba435c0-ee18-11ee-9562-c14cd4b3a5e3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..28943dfca3a015d19343a5336cb222cb9a10e1a0
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba435c0-ee18-11ee-9562-c14cd4b3a5e3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.85
+ 100.64.23.85
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1711749995
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9ba435c0-ee18-11ee-9562-c14cd4b3a5e3
+
+
+
diff --git a/graph/incidents_graphml/9/9ba59f10-a241-11ed-98e5-7fafbdfab608.graphml b/graph/incidents_graphml/9/9ba59f10-a241-11ed-98e5-7fafbdfab608.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ebe77478731dbd7416c57623885b1bfd2396e562
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba59f10-a241-11ed-98e5-7fafbdfab608.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.54.98
+ 100.64.54.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1675263818
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ba59f10-a241-11ed-98e5-7fafbdfab608
+
+
+
diff --git a/graph/incidents_graphml/9/9ba5e380-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9ba5e380-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..308afaee494915cef43ed1cf36f9e9e246b61d02
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba5e380-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.75.125
+ USER-0015-1757.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320900
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ba5e380-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e908a5f870aee8cee12a7f6c874ae1e7f1b19fee
--- /dev/null
+++ b/graph/incidents_graphml/9/9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,99 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.18
+ USER-0015-1780.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.80.210
+ 100.64.80.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.106
+ 100.64.73.106
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9baa3ca0-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/9/9baa3ca0-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cbae5282a993bc959fe336a262bbf79523cac271
--- /dev/null
+++ b/graph/incidents_graphml/9/9baa3ca0-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.152
+ 100.64.35.152
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548914
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9baa3ca0-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/9/9badf9d0-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9badf9d0-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9af439f8e7b522a9a11ca35e36af93ec41a7826
--- /dev/null
+++ b/graph/incidents_graphml/9/9badf9d0-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.75.125
+ USER-0015-1757.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320900
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9badf9d0-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9bb39ba0-2bbc-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/9/9bb39ba0-2bbc-11ef-b37a-07248b6407de.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..58e2431843034ea166168c455a795fe2d2337f67
--- /dev/null
+++ b/graph/incidents_graphml/9/9bb39ba0-2bbc-11ef-b37a-07248b6407de.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.72
+ 100.64.24.72
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.73
+ 100.64.24.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.74
+ 100.64.24.74
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.75
+ USER-0015-1249.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+ INCIDENT_LINK
+ 1718527453
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bb39ba0-2bbc-11ef-b37a-07248b6407de
+
+
+
diff --git a/graph/incidents_graphml/9/9bb42160-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/9/9bb42160-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44628abbffa0963fed36dc577fd5218c121b0646
--- /dev/null
+++ b/graph/incidents_graphml/9/9bb42160-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.34
+ 100.64.18.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703201
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9bb42160-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/9/9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..944066856d403ddd994e2a1e5e1ae508c5f2422d
--- /dev/null
+++ b/graph/incidents_graphml/9/9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.226
+ USER-0015-1727.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.135
+ 100.64.77.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9bb8bb90-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/9/9bb8bb90-3f76-11ee-a907-25e49d688e74.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..267b30f76264d693972f2c0fdc7fedf0bf726cdc
--- /dev/null
+++ b/graph/incidents_graphml/9/9bb8bb90-3f76-11ee-a907-25e49d688e74.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.152
+ 100.64.35.152
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692548914
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9bb8bb90-3f76-11ee-a907-25e49d688e74
+
+
+
diff --git a/graph/incidents_graphml/9/9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6fe29dca019b8be80864bc0a5c75a7d77f097686
--- /dev/null
+++ b/graph/incidents_graphml/9/9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.211
+ USER-0015-1851.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9bbc78c0-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9bbc78c0-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fb7950541d0ef14fa1fc5a8ed497ab094d67472c
--- /dev/null
+++ b/graph/incidents_graphml/9/9bbc78c0-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.9.103
+ 100.64.9.103
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1659320900
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9bbc78c0-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..272da79af278189e4394b55f35bc97925dbb6d52
--- /dev/null
+++ b/graph/incidents_graphml/9/9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.80.211
+ USER-0015-1851.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656920013
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9
+
+
+
diff --git a/graph/incidents_graphml/9/9bc0be80-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9bc0be80-1141-11ed-872b-6f6effadac60.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d7420e5818b88f77ff3f001abfd7ddae35cfa864
--- /dev/null
+++ b/graph/incidents_graphml/9/9bc0be80-1141-11ed-872b-6f6effadac60.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.227
+ 100.64.70.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.77.125
+ USER-0015-1758.example.internal
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1659320900
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9bc0be80-1141-11ed-872b-6f6effadac60
+
+
+
diff --git a/graph/incidents_graphml/9/9bcfd040-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9bcfd040-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c9c3ef1439a8c042233d97b9683d1a9038a9b651
--- /dev/null
+++ b/graph/incidents_graphml/9/9bcfd040-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.99
+ USER-0015-1634.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.52
+ 100.64.72.52
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.66.32
+ 100.64.66.32
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.100
+ 100.64.72.100
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.17.55
+ 100.64.17.55
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.72.101
+ 100.64.72.101
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.12.144
+ 100.64.12.144
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.38.180
+ 100.64.38.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480590
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bcfd040-238e-11ee-8f53-17c8a7373bd3
+
+
+
diff --git a/graph/incidents_graphml/9/9bd57cc0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9bd57cc0-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96575d5a679d7f9a50caa881959aa06dcfec6a79
--- /dev/null
+++ b/graph/incidents_graphml/9/9bd57cc0-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.129
+ 100.64.27.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315926
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9bd57cc0-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9be47630-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/9be47630-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9bfae09b8ad28481c8151e01b6ccd350bc01d6df
--- /dev/null
+++ b/graph/incidents_graphml/9/9be47630-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.36
+ 100.64.55.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.71
+ 100.64.74.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.19.12
+ 100.64.19.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.12.89
+ 100.64.12.89
+ ["Exploiting Host","Exploiting Target"]
+ 0.915625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.15.194
+ 100.64.15.194
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797656
+ malicious
+ 0.915625
+ 0.915625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9be47630-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/9/9be66900-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9be66900-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ae5a062c6f1db04dc2b355deeb67c242068cbaeb
--- /dev/null
+++ b/graph/incidents_graphml/9/9be66900-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,229 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.67
+ 100.64.73.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.68
+ 100.64.73.68
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.158
+ USER-0015-1647.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.69
+ 100.64.73.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.70
+ 100.64.73.70
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.221
+ 100.64.71.221
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.71
+ 100.64.73.71
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9be66900-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/9be864d0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9be864d0-21d6-11ed-900b-09bc7217b13b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eeb3c2a7968615b4baa152ee0e19dd12a488d029
--- /dev/null
+++ b/graph/incidents_graphml/9/9be864d0-21d6-11ed-900b-09bc7217b13b.graphml
@@ -0,0 +1,301 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.42
+ 100.64.73.42
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.224
+ 100.64.71.224
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.43
+ 100.64.73.43
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.44
+ 100.64.73.44
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.45
+ 100.64.73.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.46
+ 100.64.73.46
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.79
+ 100.64.72.79
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.47
+ 100.64.73.47
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.130
+ 100.64.71.130
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+ INCIDENT_LINK
+ 1661144114
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9be864d0-21d6-11ed-900b-09bc7217b13b
+
+
+
diff --git a/graph/incidents_graphml/9/9bec7cf0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9bec7cf0-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..aa3e939c5f423b564586420f069cf5a19264ff48
--- /dev/null
+++ b/graph/incidents_graphml/9/9bec7cf0-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.198
+ 100.64.49.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bec7cf0-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9bf0f400-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9bf0f400-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e970cc77ffcd924c5ed1507f22ba8117e3590e1e
--- /dev/null
+++ b/graph/incidents_graphml/9/9bf0f400-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.129
+ 100.64.27.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315927
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9bf0f400-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9bfc2710-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9bfc2710-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..eb153045fb87109751ee15e80cb4918fdcd02733
--- /dev/null
+++ b/graph/incidents_graphml/9/9bfc2710-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.80.119
+ 100.64.80.119
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766302
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bfc2710-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766302
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9bfc2710-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/9/9bfdbb00-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9bfdbb00-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1890a0e2be6197b12e2b4af0e481a5a759d6744b
--- /dev/null
+++ b/graph/incidents_graphml/9/9bfdbb00-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.49.200
+ 100.64.49.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658540
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9bfdbb00-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c0c8810-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c0c8810-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..590a71dcc9d147581818067759f82a3802848c57
--- /dev/null
+++ b/graph/incidents_graphml/9/9c0c8810-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.49.200
+ 100.64.49.200
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658540
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c0c8810-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c1f5700-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9c1f5700-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..77772edda23bc6d7fe9df8ab99e7d91045688223
--- /dev/null
+++ b/graph/incidents_graphml/9/9c1f5700-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315927
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c1f5700-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/9/9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c7536ffc2d4873773bf48c0f917a1e17d8172730
--- /dev/null
+++ b/graph/incidents_graphml/9/9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ HOST
+ 100.64.81.128
+ 100.64.81.128
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1681490663
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5
+
+
+
diff --git a/graph/incidents_graphml/9/9c426f60-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9c426f60-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..656a6c08225c08faf68c688001a820beb5583a81
--- /dev/null
+++ b/graph/incidents_graphml/9/9c426f60-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.221
+ 100.64.12.221
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315927
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c426f60-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9c46b920-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9c46b920-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f71a5506274c731162e23f5bce95510d06d132ac
--- /dev/null
+++ b/graph/incidents_graphml/9/9c46b920-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,265 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.10.210
+ 100.64.10.210
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.10
+ 100.64.67.10
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.11
+ USER-0015-1482.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.157
+ 100.64.14.157
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.12
+ 100.64.67.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.122
+ USER-0015-1214.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/9c4decc0-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9c4decc0-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cb7bd4451ef26e581ce18a2e25c50cba2d5c19f7
--- /dev/null
+++ b/graph/incidents_graphml/9/9c4decc0-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.113
+ 100.64.18.113
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780414
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c4decc0-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/9/9c567090-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9c567090-6ee9-11ee-ab04-93e2c60bb3fe.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..859f353eff0abce90f91c1fdf2f6be5f3d0a9d36
--- /dev/null
+++ b/graph/incidents_graphml/9/9c567090-6ee9-11ee-ab04-93e2c60bb3fe.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.16
+ 100.64.67.16
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c567090-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c567090-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+ INCIDENT_LINK
+ 1697766012
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c567090-6ee9-11ee-ab04-93e2c60bb3fe
+
+
+
diff --git a/graph/incidents_graphml/9/9c5ad720-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9c5ad720-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bde33fc9a16240c418b6d68d31298fa76c5c305
--- /dev/null
+++ b/graph/incidents_graphml/9/9c5ad720-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.35.198
+ 100.64.35.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c5ad720-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9c5df250-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9c5df250-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d0ca2e9245c873cc1dc50cb12ee1d98f4b6cb6c
--- /dev/null
+++ b/graph/incidents_graphml/9/9c5df250-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.115
+ 100.64.18.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780414
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c5df250-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/9/9c63f6e0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c63f6e0-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f64ed4f3831290d1cab57ad44fbea7e0f40c8902
--- /dev/null
+++ b/graph/incidents_graphml/9/9c63f6e0-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c63f6e0-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c6bcd80-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9c6bcd80-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3f261f0b625566c867fcd37c6c259010ca0a43a5
--- /dev/null
+++ b/graph/incidents_graphml/9/9c6bcd80-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.173
+ 100.64.23.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171291
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c6bcd80-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9c6c4a30-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9c6c4a30-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42d6ff1f4bf801bef546df566e83b6afcca58e2a
--- /dev/null
+++ b/graph/incidents_graphml/9/9c6c4a30-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.54.66
+ 172.24.54.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.115
+ 100.64.18.115
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780414
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c6c4a30-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/9/9c6dc2e0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9c6dc2e0-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..145e150d02863947c5059afebf8e9bce9e792ef6
--- /dev/null
+++ b/graph/incidents_graphml/9/9c6dc2e0-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.198
+ 100.64.35.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788907
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9c6dc2e0-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9c724ec0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c724ec0-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6bab8d07e2aa32cfa4b2b9776202cf197a6068f0
--- /dev/null
+++ b/graph/incidents_graphml/9/9c724ec0-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.109
+ 100.64.7.109
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658541
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c724ec0-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c796210-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9c796210-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c225da670312b42160f7848a4b969f50f6e1d090
--- /dev/null
+++ b/graph/incidents_graphml/9/9c796210-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.173
+ 100.64.23.173
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c796210-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9c7e5cb0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c7e5cb0-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..edcd70f420365a3543094a7a622b6e9c6a4088c7
--- /dev/null
+++ b/graph/incidents_graphml/9/9c7e5cb0-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c7e5cb0-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c8117f0-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/9/9c8117f0-df14-11ee-9778-4184b1db151c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..80ef479f2a994659cff2256dfdeeee2a02fce652
--- /dev/null
+++ b/graph/incidents_graphml/9/9c8117f0-df14-11ee-9778-4184b1db151c.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.238
+ 100.64.9.238
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.239
+ 100.64.9.239
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.240
+ 100.64.9.240
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.241
+ 100.64.9.241
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.242
+ 100.64.9.242
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.5.59
+ 100.64.5.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.243
+ 100.64.9.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.244
+ 100.64.9.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+ INCIDENT_LINK
+ 1710099011
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c8117f0-df14-11ee-9778-4184b1db151c
+
+
+
diff --git a/graph/incidents_graphml/9/9c831500-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/9/9c831500-274f-11ee-9ae4-f7600c9ae4b6.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41d61c404d84b73af6fd80fef74c93b649a033b2
--- /dev/null
+++ b/graph/incidents_graphml/9/9c831500-274f-11ee-9ae4-f7600c9ae4b6.graphml
@@ -0,0 +1,149 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.63.47
+ 100.64.63.47
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.121
+ 100.64.21.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.48
+ 100.64.63.48
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689893337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c831500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c831500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c831500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c831500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c831500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+ INCIDENT_LINK
+ 1689893337
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9c831500-274f-11ee-9ae4-f7600c9ae4b6
+
+
+
diff --git a/graph/incidents_graphml/9/9c8c3f60-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c8c3f60-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..402e81f178038a8ac4374661e8b3223c037870fb
--- /dev/null
+++ b/graph/incidents_graphml/9/9c8c3f60-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658541
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9c8c3f60-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c984d50-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c984d50-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2f180a0a4cdfd8ca004036a8a421c7a2cddccac8
--- /dev/null
+++ b/graph/incidents_graphml/9/9c984d50-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.43.4
+ 100.64.43.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658541
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c984d50-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/9/9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ea22735b7dd9ab27f906da05dd731c53b279f099
--- /dev/null
+++ b/graph/incidents_graphml/9/9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.134.133
+ USER-0015-2062.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","ASA Firewall"]
+
+
+ HOST
+ 100.64.91.47
+ 100.64.91.47
+ ["Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1720449023
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2
+
+
+ INCIDENT_LINK
+ 1720449023
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2
+
+
+
diff --git a/graph/incidents_graphml/9/9ca29f00-0c8d-11ef-a421-bb714b96b7ea.graphml b/graph/incidents_graphml/9/9ca29f00-0c8d-11ef-a421-bb714b96b7ea.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..360776125943a339b4e5100d2edaa4e2177fbf9f
--- /dev/null
+++ b/graph/incidents_graphml/9/9ca29f00-0c8d-11ef-a421-bb714b96b7ea.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.193
+ 100.64.67.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715098783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca29f00-0c8d-11ef-a421-bb714b96b7ea
+
+
+
diff --git a/graph/incidents_graphml/9/9ca4c510-1173-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/9/9ca4c510-1173-11ef-98dd-db867c05f09b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..fd5ae1907d476e5ced55854d5f2ab5a4a60edd03
--- /dev/null
+++ b/graph/incidents_graphml/9/9ca4c510-1173-11ef-98dd-db867c05f09b.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.20.181.243
+ 172.20.181.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.97.50
+ 100.64.97.50
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.89.33
+ 100.64.89.33
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.91.138
+ 100.64.91.138
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.4
+ 100.64.87.4
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637371
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ca4c510-1173-11ef-98dd-db867c05f09b
+
+
+
diff --git a/graph/incidents_graphml/9/9ca5bad0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9ca5bad0-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..088c72b8859bcc03b9dab4b08ad62a5af62a5084
--- /dev/null
+++ b/graph/incidents_graphml/9/9ca5bad0-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.4
+ 100.64.43.4
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658541
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ca5bad0-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9cbfcdd0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/9/9cbfcdd0-212f-11ef-98de-f5bd3e11f54f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4737b4c188ef0b3261f74318eb0c75a428f76687
--- /dev/null
+++ b/graph/incidents_graphml/9/9cbfcdd0-212f-11ef-98de-f5bd3e11f54f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.32.159
+ 100.64.32.159
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717367384
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cbfcdd0-212f-11ef-98de-f5bd3e11f54f
+
+
+
diff --git a/graph/incidents_graphml/9/9cd13790-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/9/9cd13790-70e6-11ee-adf7-3be9df66b766.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10ac3c443092e11e8a07a53f9eaf2d47d0b65a28
--- /dev/null
+++ b/graph/incidents_graphml/9/9cd13790-70e6-11ee-adf7-3be9df66b766.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.246
+ 100.64.28.246
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.6625
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"]
+
+
+ HOST
+ 100.64.11.114
+ 100.64.11.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1697984627
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cd13790-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984627
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cd13790-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984627
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cd13790-70e6-11ee-adf7-3be9df66b766
+
+
+ INCIDENT_LINK
+ 1697984627
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cd13790-70e6-11ee-adf7-3be9df66b766
+
+
+
diff --git a/graph/incidents_graphml/9/9cd3cb00-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/9/9cd3cb00-212f-11ef-98de-f5bd3e11f54f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..771c23fd59ff985eeb759b9558554655dd4d9eba
--- /dev/null
+++ b/graph/incidents_graphml/9/9cd3cb00-212f-11ef-98de-f5bd3e11f54f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.13
+ 100.64.16.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717367385
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9cd3cb00-212f-11ef-98de-f5bd3e11f54f
+
+
+
diff --git a/graph/incidents_graphml/9/9cd6ded0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9cd6ded0-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6990ee22ab90c4cb7cadacc76710b67eecf0cb4d
--- /dev/null
+++ b/graph/incidents_graphml/9/9cd6ded0-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.39.179
+ 100.64.39.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274731
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9cd6ded0-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9ce231c0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/9ce231c0-2483-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..35e661872a9c1220439c8414f401166c5f12de5b
--- /dev/null
+++ b/graph/incidents_graphml/9/9ce231c0-2483-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,459 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.16
+ 100.64.24.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.148
+ 100.64.21.148
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.191
+ 100.64.15.191
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.17
+ 100.64.24.17
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.18
+ 100.64.24.18
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.19
+ 100.64.24.19
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.20
+ 100.64.24.20
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.21
+ 100.64.24.21
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.11.166
+ 172.31.11.166
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.22
+ 100.64.24.22
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.23
+ 100.64.24.23
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.24
+ 100.64.24.24
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ce231c0-2483-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/9/9ce249f0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/9/9ce249f0-212f-11ef-98de-f5bd3e11f54f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..987756282b6c0969cc3aa9cc8663da6661594695
--- /dev/null
+++ b/graph/incidents_graphml/9/9ce249f0-212f-11ef-98de-f5bd3e11f54f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.16.13
+ 100.64.16.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717367385
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ce249f0-212f-11ef-98de-f5bd3e11f54f
+
+
+
diff --git a/graph/incidents_graphml/9/9ce41580-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9ce41580-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a7f9089f54c59919d4cd4f03922d5686eedba41
--- /dev/null
+++ b/graph/incidents_graphml/9/9ce41580-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.218
+ 100.64.46.218
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146256
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ce41580-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/9/9ce69050-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ce69050-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9f7a81001a19d7b62d78209b938d73573cc09e66
--- /dev/null
+++ b/graph/incidents_graphml/9/9ce69050-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.200
+ 100.64.88.200
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139301
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9ce69050-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/9/9cef96f0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9cef96f0-2ac7-11ee-a22a-2dc333e44cac.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1cbce0be65a1573e3b95f2ca762febfacb3f1ad9
--- /dev/null
+++ b/graph/incidents_graphml/9/9cef96f0-2ac7-11ee-a22a-2dc333e44cac.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.26.73.92
+ 172.26.73.92
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.115
+ 100.64.13.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690274731
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9cef96f0-2ac7-11ee-a22a-2dc333e44cac
+
+
+
diff --git a/graph/incidents_graphml/9/9cf47e10-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9cf47e10-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4bc2fca7c8c3b2cd2bd634a865674713ace75d2e
--- /dev/null
+++ b/graph/incidents_graphml/9/9cf47e10-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ USER-0015-1985.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.30.112
+ 100.64.30.112
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695183020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9cf47e10-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/9/9cfa3590-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9cfa3590-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0e80c3d4b8ba358427444ae595c15ebb54c2a7a6
--- /dev/null
+++ b/graph/incidents_graphml/9/9cfa3590-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.46.220
+ USER-0015-1362.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146256
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9cfa3590-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/9/9cfa4da0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/9cfa4da0-2483-11ef-9829-f7a898ee5380.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ad895394b8a4edbc111491c841aba823dc36fbe8
--- /dev/null
+++ b/graph/incidents_graphml/9/9cfa4da0-2483-11ef-9829-f7a898ee5380.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.34
+ 100.64.24.34
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.35
+ 100.64.24.35
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.60
+ 100.64.4.60
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.36
+ 100.64.24.36
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.153
+ 100.64.9.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.37
+ 100.64.24.37
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.195
+ 100.64.6.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.38
+ 100.64.24.38
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+ INCIDENT_LINK
+ 1717733316
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9cfa4da0-2483-11ef-9829-f7a898ee5380
+
+
+
diff --git a/graph/incidents_graphml/9/9d02eaa0-1173-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/9/9d02eaa0-1173-11ef-98dd-db867c05f09b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2653d6e6661976ff0f7a0678c629f3950ba35bbb
--- /dev/null
+++ b/graph/incidents_graphml/9/9d02eaa0-1173-11ef-98dd-db867c05f09b.graphml
@@ -0,0 +1,329 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.97.51
+ USER-0015-2166.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"]
+
+
+ HOST
+ 100.64.6.183
+ 100.64.6.183
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.63.90
+ 100.64.63.90
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.236
+ USER-0015-2167.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.250
+ 100.64.13.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.6.70
+ 100.64.6.70
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.47.117
+ USER-0015-2168.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.12.250
+ 100.64.12.250
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+ INCIDENT_LINK
+ 1715637372
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d02eaa0-1173-11ef-98dd-db867c05f09b
+
+
+
diff --git a/graph/incidents_graphml/9/9d0dace0-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9d0dace0-085b-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d839e5f9aaba63457e0a981256bd01670f300094
--- /dev/null
+++ b/graph/incidents_graphml/9/9d0dace0-085b-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.198
+ 100.64.14.198
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714637504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d0dace0-085b-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/9/9d0f6b40-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9d0f6b40-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e9333316f8854537ce018e05b9a4e7d3a888f80b
--- /dev/null
+++ b/graph/incidents_graphml/9/9d0f6b40-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.46.220
+ USER-0015-1362.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146256
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d0f6b40-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/9/9d196430-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9d196430-9250-11ee-af25-efae5f68b6f3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3cc7b1abb512f5e10bc36be59ffaa72cc539af63
--- /dev/null
+++ b/graph/incidents_graphml/9/9d196430-9250-11ee-af25-efae5f68b6f3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.8.174
+ 100.64.8.174
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1701658542
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d196430-9250-11ee-af25-efae5f68b6f3
+
+
+
diff --git a/graph/incidents_graphml/9/9d1a7420-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/9/9d1a7420-038e-11ee-8785-53111c12ea35.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f733ca20fbcaa5263eeeb8df326b4540518c7297
--- /dev/null
+++ b/graph/incidents_graphml/9/9d1a7420-038e-11ee-8785-53111c12ea35.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.82.177
+ 100.64.82.177
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.75.181
+ HOST-14580
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685962155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d1a7420-038e-11ee-8785-53111c12ea35
+
+
+ INCIDENT_LINK
+ 1685962155
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d1a7420-038e-11ee-8785-53111c12ea35
+
+
+
diff --git a/graph/incidents_graphml/9/9d1b85b0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9d1b85b0-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42a4158aaea173561f07a0aa264e95d2e3a95f5b
--- /dev/null
+++ b/graph/incidents_graphml/9/9d1b85b0-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.146
+ 100.64.81.146
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.82
+ 100.64.73.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668613923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d1b85b0-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d1b85b0-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/9/9d1f0820-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9d1f0820-65c6-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5e35a5c514431dc0e21942a05832db76db56dece
--- /dev/null
+++ b/graph/incidents_graphml/9/9d1f0820-65c6-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.147
+ 100.64.81.147
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.78.35
+ 100.64.78.35
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668613923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d1f0820-65c6-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668613923
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d1f0820-65c6-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/9/9d1f3910-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9d1f3910-085b-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..16cb6fb7e08293abd02ab88a5437b488aac8d26b
--- /dev/null
+++ b/graph/incidents_graphml/9/9d1f3910-085b-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.198
+ 100.64.14.198
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1714637504
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d1f3910-085b-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/9/9d265610-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/9d265610-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..341462736eac8df95fbe723a26613cfa0525dd8a
--- /dev/null
+++ b/graph/incidents_graphml/9/9d265610-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,653 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.115
+ 100.64.82.115
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.123
+ 100.64.72.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.71.114
+ 100.64.71.114
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.116
+ 100.64.82.116
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.255
+ 100.64.70.255
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.73.89
+ 100.64.73.89
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.117
+ 100.64.82.117
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.118
+ 100.64.82.118
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.23.69
+ 100.64.23.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.11.36
+ 100.64.11.36
+ ["Exploiting Host"]
+ 0.578125
+ ["Meraki","Precinct"]
+
+
+ HOST
+ 100.64.23.220
+ 100.64.23.220
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.82.119
+ 100.64.82.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.120
+ 100.64.82.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.121
+ 100.64.82.121
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.59.97
+ 100.64.59.97
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.122
+ 100.64.82.122
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.123
+ 100.64.82.123
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196563
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d265610-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/9d302900-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9d302900-085b-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70ce8eb878bf21e60d177700a6bcf6a26d4b6101
--- /dev/null
+++ b/graph/incidents_graphml/9/9d302900-085b-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.200
+ 100.64.14.200
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714637504
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9d302900-085b-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/9/9d366230-2292-11ed-9939-5d8e6586807c.graphml b/graph/incidents_graphml/9/9d366230-2292-11ed-9939-5d8e6586807c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..037cf2e3a5b8e66c9c3e5165087db239a5409a01
--- /dev/null
+++ b/graph/incidents_graphml/9/9d366230-2292-11ed-9939-5d8e6586807c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.210
+ 100.64.84.210
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.151.220.246
+ 10.151.220.246
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1661224861
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d366230-2292-11ed-9939-5d8e6586807c
+
+
+
diff --git a/graph/incidents_graphml/9/9d49ccd0-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/9/9d49ccd0-26aa-11ef-8ab8-f12e3827fb22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e143aaefe5473fd52ead70a3d4d582ea37e43c9
--- /dev/null
+++ b/graph/incidents_graphml/9/9d49ccd0-26aa-11ef-8ab8-f12e3827fb22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.13.113
+ 100.64.13.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717969969
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d49ccd0-26aa-11ef-8ab8-f12e3827fb22
+
+
+
diff --git a/graph/incidents_graphml/9/9d4b2990-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9d4b2990-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6e2bb8a91af440377728e49d9a9a64ab71f0e82e
--- /dev/null
+++ b/graph/incidents_graphml/9/9d4b2990-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.136
+ 100.64.15.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695183020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d4b2990-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/9/9d58c0f0-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/9/9d58c0f0-26aa-11ef-8ab8-f12e3827fb22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3ddc168e6aaf16d925a66195c4aef8c44e7f76e5
--- /dev/null
+++ b/graph/incidents_graphml/9/9d58c0f0-26aa-11ef-8ab8-f12e3827fb22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.13.113
+ 100.64.13.113
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717969969
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d58c0f0-26aa-11ef-8ab8-f12e3827fb22
+
+
+
diff --git a/graph/incidents_graphml/9/9d59f6a0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9d59f6a0-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0889513912de946a0bc11d464019f7d7d67860df
--- /dev/null
+++ b/graph/incidents_graphml/9/9d59f6a0-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.15.136
+ 100.64.15.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695183020
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9d59f6a0-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/9/9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8.graphml b/graph/incidents_graphml/9/9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..43fdd8a0afe22ddb54a41d27c0d0d2f7cb0bb22b
--- /dev/null
+++ b/graph/incidents_graphml/9/9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.61
+ 100.64.84.61
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1666410605
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8
+
+
+ INCIDENT_LINK
+ 1666410605
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8
+
+
+
diff --git a/graph/incidents_graphml/9/9d6221d0-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/9/9d6221d0-866f-11ee-8f03-878f88d78f03.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0a71aba3e67376a431e234f229eeed7185be83c0
--- /dev/null
+++ b/graph/incidents_graphml/9/9d6221d0-866f-11ee-8f03-878f88d78f03.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.198
+ 100.64.69.198
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.36.138
+ USER-0015-1510.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1700352443
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d6221d0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352443
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d6221d0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352443
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d6221d0-866f-11ee-8f03-878f88d78f03
+
+
+ INCIDENT_LINK
+ 1700352443
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d6221d0-866f-11ee-8f03-878f88d78f03
+
+
+
diff --git a/graph/incidents_graphml/9/9d634ce0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9d634ce0-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5d4caa65b00dd3afbc4e391da9473ab9df15f77
--- /dev/null
+++ b/graph/incidents_graphml/9/9d634ce0-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.244
+ 100.64.67.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171292
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d634ce0-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9d6c7ff0-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9d6c7ff0-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..3059e8263fdf7bc139577bf9f5cbcb7243f14b34
--- /dev/null
+++ b/graph/incidents_graphml/9/9d6c7ff0-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,509 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.211
+ 100.64.29.211
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.2
+ 100.64.71.2
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.62.145
+ 100.64.62.145
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.42.162
+ 100.64.42.162
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.156
+ 100.64.72.156
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.9.156
+ 100.64.9.156
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.1.59
+ 100.64.1.59
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.120
+ 100.64.80.120
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.121
+ 100.64.80.121
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.69.149
+ 100.64.69.149
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.122
+ 100.64.80.122
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.73.65
+ 100.64.73.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.123
+ 100.64.80.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.80.124
+ 100.64.80.124
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766305
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d6c7ff0-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/9/9d7219f0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9d7219f0-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..717a5cfc285f5cc5b0ee4181646268106eef651a
--- /dev/null
+++ b/graph/incidents_graphml/9/9d7219f0-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.244
+ 100.64.67.244
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171293
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7219f0-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9d7317d0-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9d7317d0-6071-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c8c938589e04c6cc5a4158741dc3e52be097c8fd
--- /dev/null
+++ b/graph/incidents_graphml/9/9d7317d0-6071-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.1.28
+ USER-0015-1750.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.75
+ 100.64.77.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall"]
+
+
+ HOST
+ 100.64.77.76
+ 100.64.77.76
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.35.158
+ 100.64.35.158
+ ["Exploiting Host","Exploiting Target"]
+ 0.9634375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.77.77
+ 100.64.77.77
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027660
+ malicious
+ 0.9634375
+ 0.9634375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d7317d0-6071-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/9/9d737780-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9d737780-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..42abe632c54522c9cc3080dd61c2a7294b4410ce
--- /dev/null
+++ b/graph/incidents_graphml/9/9d737780-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,257 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.64.193
+ 100.64.64.193
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.225
+ 100.64.29.225
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.194
+ 100.64.64.194
+ ["Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.195
+ 100.64.64.195
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.6.153
+ 100.64.6.153
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d737780-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/9/9d7a5320-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9d7a5320-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c918ea490b2a2927a8f5e9a35d94a64608fec338
--- /dev/null
+++ b/graph/incidents_graphml/9/9d7a5320-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.23.231
+ 100.64.23.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d7a5320-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9d869770-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/9/9d869770-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf586825be554394b8b5a477fab87a5aa45a0df4
--- /dev/null
+++ b/graph/incidents_graphml/9/9d869770-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703204
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d869770-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/9/9d88ad30-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9d88ad30-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1bdac972cca5b45020ca0eca6da91b9e94c73aa9
--- /dev/null
+++ b/graph/incidents_graphml/9/9d88ad30-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,193 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.26.140
+ 100.64.26.140
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.8.67
+ 100.64.8.67
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.199
+ 100.64.64.199
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.106
+ 100.64.34.106
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d88ad30-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/9/9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7488f237eb277b42105296ce022de3e5033ab8da
--- /dev/null
+++ b/graph/incidents_graphml/9/9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.158
+ 100.64.72.158
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.18.40
+ 100.64.18.40
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.159
+ 100.64.72.159
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1687961463
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961463
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961463
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+ INCIDENT_LINK
+ 1687961463
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e
+
+
+
diff --git a/graph/incidents_graphml/9/9d928750-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9d928750-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..561296619a643e4e816b5310b7a9b1bf747efa99
--- /dev/null
+++ b/graph/incidents_graphml/9/9d928750-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.117
+ 100.64.87.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1671749250
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9d928750-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/9d968db0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9d968db0-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9a0a4fafa1bcf7c312b16c065a89d15b01334af7
--- /dev/null
+++ b/graph/incidents_graphml/9/9d968db0-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.214.148
+ 172.30.214.148
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.231
+ 100.64.23.231
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315929
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d968db0-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9d981680-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9d981680-25e6-11ee-8760-d9b0ea984292.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..25689f5804aa1b2cf719fbf7d4727990db0e54bc
--- /dev/null
+++ b/graph/incidents_graphml/9/9d981680-25e6-11ee-8760-d9b0ea984292.graphml
@@ -0,0 +1,617 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.51.22
+ 100.64.51.22
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.201
+ 100.64.64.201
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.202
+ 100.64.64.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.203
+ 100.64.64.203
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.95
+ 100.64.27.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.12
+ 100.64.17.12
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.4.69
+ 100.64.4.69
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.841796875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.204
+ 100.64.64.204
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.59
+ 100.64.27.59
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.121
+ 100.64.18.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.17.98
+ 100.64.17.98
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.205
+ 100.64.64.205
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.64.206
+ 100.64.64.206
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.171
+ 100.64.14.171
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+ INCIDENT_LINK
+ 1689738291
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9d981680-25e6-11ee-8760-d9b0ea984292
+
+
+
diff --git a/graph/incidents_graphml/9/9d998c30-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9d998c30-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..90a0f5ed6db110ce93a01c6cad8be144a329a3d2
--- /dev/null
+++ b/graph/incidents_graphml/9/9d998c30-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ USER-0015-1965.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.117
+ 100.64.87.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1671749250
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d998c30-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/9d9ba610-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/9/9d9ba610-1c7c-11ee-9c01-8b4657fad9e1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7fbdcc9dc9116865f11b7f7b014fb713db736e09
--- /dev/null
+++ b/graph/incidents_graphml/9/9d9ba610-1c7c-11ee-9c01-8b4657fad9e1.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.232.220
+ 172.16.232.220
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.21.180
+ 100.64.21.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688703204
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d9ba610-1c7c-11ee-9c01-8b4657fad9e1
+
+
+
diff --git a/graph/incidents_graphml/9/9d9c7d90-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9d9c7d90-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4a2c4b3aad992969bced14b36e270c30c3e8d9b9
--- /dev/null
+++ b/graph/incidents_graphml/9/9d9c7d90-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.1
+ 100.64.34.1
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087735
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9d9c7d90-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/9/9da156b0-8d5f-11ee-9951-411438339097.graphml b/graph/incidents_graphml/9/9da156b0-8d5f-11ee-9951-411438339097.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..66f37844d4f7c4098fc499abdac7a3ac969cd787
--- /dev/null
+++ b/graph/incidents_graphml/9/9da156b0-8d5f-11ee-9951-411438339097.graphml
@@ -0,0 +1,321 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.15
+ 100.64.55.15
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.10
+ 100.64.68.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.16
+ 100.64.68.16
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.68.9
+ 100.64.68.9
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.25
+ ["Precinct"]
+
+
+ HOST
+ 100.64.68.17
+ 100.64.68.17
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.18
+ 100.64.68.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.22.18
+ 100.64.22.18
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.19
+ 100.64.68.19
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+ INCIDENT_LINK
+ 1701115230
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Unprocessed
+ 9da156b0-8d5f-11ee-9951-411438339097
+
+
+
diff --git a/graph/incidents_graphml/9/9da6f4b0-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9da6f4b0-2885-11ee-ab6d-398d68629c7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0b8bc944e4f819f4e5bf3b31f6f54e6b99bd9dd5
--- /dev/null
+++ b/graph/incidents_graphml/9/9da6f4b0-2885-11ee-ab6d-398d68629c7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.85
+ 100.64.48.85
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690026483
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9da6f4b0-2885-11ee-ab6d-398d68629c7b
+
+
+
diff --git a/graph/incidents_graphml/9/9db03fa0-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9db03fa0-0ebf-11ee-9392-932bfd273540.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d5c295d911374aa773cd6bdb843879a2bee077e3
--- /dev/null
+++ b/graph/incidents_graphml/9/9db03fa0-0ebf-11ee-9392-932bfd273540.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.195
+ 100.64.72.195
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.196
+ 100.64.72.196
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1687192664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9db03fa0-0ebf-11ee-9392-932bfd273540
+
+
+ INCIDENT_LINK
+ 1687192664
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9db03fa0-0ebf-11ee-9392-932bfd273540
+
+
+
diff --git a/graph/incidents_graphml/9/9db909d0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9db909d0-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8c344daa29874c37452105403b7d89b9132d631f
--- /dev/null
+++ b/graph/incidents_graphml/9/9db909d0-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.27.131
+ 100.64.27.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315929
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9db909d0-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9db9c990-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9db9c990-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0fffc2b1fea5e617c28a2fe95e2e5633443c363d
--- /dev/null
+++ b/graph/incidents_graphml/9/9db9c990-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.3
+ 100.64.34.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087735
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9db9c990-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/9/9dc4c180-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9dc4c180-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10ed4e9830071ea58ca16032b8a51588e332c4f9
--- /dev/null
+++ b/graph/incidents_graphml/9/9dc4c180-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696103
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9dc4c180-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9dd5ff90-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9dd5ff90-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..70908030a01b27a500e775e75649b1aeaa074c41
--- /dev/null
+++ b/graph/incidents_graphml/9/9dd5ff90-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.133
+ 100.64.33.133
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9dd5ff90-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9dd914f0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9dd914f0-0fde-11ee-84f8-b581dff41d6b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1a199873950f4ebf951d7685ffbbd556054f3497
--- /dev/null
+++ b/graph/incidents_graphml/9/9dd914f0-0fde-11ee-84f8-b581dff41d6b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.168.48
+ 172.30.168.48
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.27.131
+ 100.64.27.131
+ ["Exploiting Host"]
+ 0.8875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687315930
+ malicious
+ 0.8875
+ 0.8875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9dd914f0-0fde-11ee-84f8-b581dff41d6b
+
+
+
diff --git a/graph/incidents_graphml/9/9ddf2d30-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9ddf2d30-6606-11ee-962d-dd0cd806580f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e915d845e802f98c9a6f2c6c9e3eaced96fe9673
--- /dev/null
+++ b/graph/incidents_graphml/9/9ddf2d30-6606-11ee-962d-dd0cd806580f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.168.229
+ 172.23.168.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.35.200
+ 100.64.35.200
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696788910
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ddf2d30-6606-11ee-962d-dd0cd806580f
+
+
+
diff --git a/graph/incidents_graphml/9/9de65340-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9de65340-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..889c0be32fc34ba77e82f2fcb3e29ed8902ec30e
--- /dev/null
+++ b/graph/incidents_graphml/9/9de65340-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,85 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.42.123
+ 100.64.42.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.96.192
+ 172.18.96.192
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9de65340-49e5-11ee-adbc-ad3007b13df0
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9de65340-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9df56e70-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9df56e70-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7ccdbd79dc93a2ec9a358c9b3a588c1bda7d7af8
--- /dev/null
+++ b/graph/incidents_graphml/9/9df56e70-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.42.123
+ 100.64.42.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9df56e70-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9dfd3b80-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9dfd3b80-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..65e25826e4f8840b04bca0d71a97af442bed7487
--- /dev/null
+++ b/graph/incidents_graphml/9/9dfd3b80-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 100.64.86.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"]
+
+
+ HOST
+ 100.64.90.3
+ 100.64.90.3
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695183021
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9dfd3b80-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/9/9e059b10-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e059b10-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4353efc0fc30ee119078f68326abcdb52496386f
--- /dev/null
+++ b/graph/incidents_graphml/9/9e059b10-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.40.123
+ 100.64.40.123
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e059b10-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9e09e5b0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9e09e5b0-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..44ee3e4cd99eb261f1c07fec4eb795e485da5583
--- /dev/null
+++ b/graph/incidents_graphml/9/9e09e5b0-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.63
+ 100.64.40.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1695183022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e09e5b0-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/9/9e1356b0-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e1356b0-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a6088997bb4363273641aa911ce381e6587d5fce
--- /dev/null
+++ b/graph/incidents_graphml/9/9e1356b0-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.140
+ 100.64.37.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e1356b0-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9e165850-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9e165850-2885-11ee-ab6d-398d68629c7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7cbbfea1f6dd47bc820f3f10e2a8462c9785d5a0
--- /dev/null
+++ b/graph/incidents_graphml/9/9e165850-2885-11ee-ab6d-398d68629c7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.87
+ 100.64.48.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690026484
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e165850-2885-11ee-ab6d-398d68629c7b
+
+
+
diff --git a/graph/incidents_graphml/9/9e18d9d0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9e18d9d0-576b-11ee-b369-595b8ff2e388.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1e1fe3e4ae7daf4656a8d665ea88c3979e037764
--- /dev/null
+++ b/graph/incidents_graphml/9/9e18d9d0-576b-11ee-b369-595b8ff2e388.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.221.82.8
+ 10.221.82.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.40.63
+ 100.64.40.63
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695183022
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9e18d9d0-576b-11ee-b369-595b8ff2e388
+
+
+
diff --git a/graph/incidents_graphml/9/9e1ce4f0-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/9e1ce4f0-3a81-11ee-b55b-6596b150fac1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..69c0af06c02f9af1dfbb853c3798cf1e494ddd95
--- /dev/null
+++ b/graph/incidents_graphml/9/9e1ce4f0-3a81-11ee-b55b-6596b150fac1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.12.95
+ 100.64.12.95
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.43
+ 100.64.68.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","ProofPoint Protect"]
+
+
+ INCIDENT_LINK
+ 1692003887
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e1ce4f0-3a81-11ee-b55b-6596b150fac1
+
+
+ INCIDENT_LINK
+ 1692003887
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e1ce4f0-3a81-11ee-b55b-6596b150fac1
+
+
+
diff --git a/graph/incidents_graphml/9/9e1d89a0-6a83-11ee-8b64-8bde2abad778.graphml b/graph/incidents_graphml/9/9e1d89a0-6a83-11ee-8b64-8bde2abad778.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e5b1804e242f71dd3a9a0c66cb4e49feb97c7ea
--- /dev/null
+++ b/graph/incidents_graphml/9/9e1d89a0-6a83-11ee-8b64-8bde2abad778.graphml
@@ -0,0 +1,409 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.201.119
+ 172.30.201.119
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.44
+ 100.64.20.44
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.237
+ 100.64.43.237
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.238
+ 100.64.43.238
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.180
+ 100.64.11.180
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.239
+ 100.64.43.239
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.240
+ 100.64.43.240
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.99
+ 100.64.10.99
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.241
+ 100.64.43.241
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.30.214
+ 100.64.30.214
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.154
+ 100.64.11.154
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+ INCIDENT_LINK
+ 1697282402
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e1d89a0-6a83-11ee-8b64-8bde2abad778
+
+
+
diff --git a/graph/incidents_graphml/9/9e216070-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e216070-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a80761cbf7674033b7d6ead9be6c1e06a25a76f7
--- /dev/null
+++ b/graph/incidents_graphml/9/9e216070-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.117.12.163
+ 10.117.12.163
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.140
+ 100.64.37.140
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9e216070-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9e218d50-72a6-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/9/9e218d50-72a6-11ed-85ba-bb75aa2d6818.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1374c022b4e5ed10f74e06d7e6298cbd55caef8f
--- /dev/null
+++ b/graph/incidents_graphml/9/9e218d50-72a6-11ed-85ba-bb75aa2d6818.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.70.233
+ 100.64.70.233
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.234
+ 100.64.70.234
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1670029546
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e218d50-72a6-11ed-85ba-bb75aa2d6818
+
+
+
diff --git a/graph/incidents_graphml/9/9e32bef0-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9e32bef0-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0c50e6455b4ba4aaf64cb977fb18571bef0d0553
--- /dev/null
+++ b/graph/incidents_graphml/9/9e32bef0-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.87.119
+ 100.64.87.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1671749251
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e32bef0-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/9e386440-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9e386440-824a-11ed-9cff-b1e619d412bc.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a92bd92dd538f8b05ba26d1aae1157344eb70fdf
--- /dev/null
+++ b/graph/incidents_graphml/9/9e386440-824a-11ed-9cff-b1e619d412bc.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.87.119
+ 100.64.87.119
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1671749251
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e386440-824a-11ed-9cff-b1e619d412bc
+
+
+
diff --git a/graph/incidents_graphml/9/9e3f3d10-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9e3f3d10-2885-11ee-ab6d-398d68629c7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2a7685e043a3d6d54b3e43f82f11f675d7d7344e
--- /dev/null
+++ b/graph/incidents_graphml/9/9e3f3d10-2885-11ee-ab6d-398d68629c7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.87
+ 100.64.48.87
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690026484
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e3f3d10-2885-11ee-ab6d-398d68629c7b
+
+
+
diff --git a/graph/incidents_graphml/9/9e484c20-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9e484c20-5909-11ee-9e4b-6beca2c0696d.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..18f97c16229bfad4e7a3d83cbcf054fc8ca56bf9
--- /dev/null
+++ b/graph/incidents_graphml/9/9e484c20-5909-11ee-9e4b-6beca2c0696d.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.56.57
+ 100.64.56.57
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695360834
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e484c20-5909-11ee-9e4b-6beca2c0696d
+
+
+
diff --git a/graph/incidents_graphml/9/9e4e7030-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9e4e7030-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bd1a3b20cfec37a599811b6f5d6a8a83e914fde4
--- /dev/null
+++ b/graph/incidents_graphml/9/9e4e7030-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.246
+ 100.64.67.246
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171294
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e4e7030-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9e547480-e50b-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/9/9e547480-e50b-11ee-9817-3f0d09cf653c.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7c9d487d397651303287e40de5d19eba61dc00ae
--- /dev/null
+++ b/graph/incidents_graphml/9/9e547480-e50b-11ee-9817-3f0d09cf653c.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.16
+ 100.64.69.16
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.40
+ 100.64.68.40
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","PAN NGFW","CASB","Protect"]
+
+
+ INCIDENT_LINK
+ 1710754855
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e547480-e50b-11ee-9817-3f0d09cf653c
+
+
+
diff --git a/graph/incidents_graphml/9/9e550de0-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/9/9e550de0-9f48-11ee-b79d-9f7e35646416.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f1b1c990020c82cfe861e8a6d5a851f968cad3c7
--- /dev/null
+++ b/graph/incidents_graphml/9/9e550de0-9f48-11ee-b79d-9f7e35646416.graphml
@@ -0,0 +1,133 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.69.13
+ 100.64.69.13
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"]
+
+
+ SERVICE
+ ["Exploited Service"]
+ 0.325
+ ["Precinct"]
+
+
+ HOST
+ 100.64.69.14
+ 100.64.69.14
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1703084473
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 9e550de0-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084473
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 9e550de0-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084473
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 9e550de0-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084473
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 9e550de0-9f48-11ee-b79d-9f7e35646416
+
+
+ INCIDENT_LINK
+ 1703084473
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target","Exploited Service"]
+ complete-mission
+ Disrupted
+ 9e550de0-9f48-11ee-b79d-9f7e35646416
+
+
+
diff --git a/graph/incidents_graphml/9/9e5d8b60-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9e5d8b60-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26230afbbd4356c0b25191c660e1b6dc923f868d
--- /dev/null
+++ b/graph/incidents_graphml/9/9e5d8b60-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.246
+ 100.64.67.246
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171294
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e5d8b60-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9e5e9080-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e5e9080-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9599baf79e0c0221b1dd1bbd71e3b30349da6b42
--- /dev/null
+++ b/graph/incidents_graphml/9/9e5e9080-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.88
+ 100.64.37.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696104
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e5e9080-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9e6a72f0-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9e6a72f0-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5bafe3e86793703068e3ed688b9b6d8f35a4dd76
--- /dev/null
+++ b/graph/incidents_graphml/9/9e6a72f0-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.246
+ 100.64.52.246
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398692
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e6a72f0-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/9e7302e0-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e7302e0-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5552687634bb2f9eec59892f8ccf30c7e1bcb8e4
--- /dev/null
+++ b/graph/incidents_graphml/9/9e7302e0-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.37.88
+ 100.64.37.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696105
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e7302e0-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9e81a9d0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9e81a9d0-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8dd0d33d41f9bf3291c6676e08489b9f6b3c6b04
--- /dev/null
+++ b/graph/incidents_graphml/9/9e81a9d0-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.72.102
+ 100.64.72.102
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.103
+ 100.64.72.103
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.6.121
+ 100.64.6.121
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480594
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e81a9d0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480594
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e81a9d0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480594
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e81a9d0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480594
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e81a9d0-238e-11ee-8f53-17c8a7373bd3
+
+
+
diff --git a/graph/incidents_graphml/9/9e891e80-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9e891e80-19b7-11ee-af67-f75f54b1c1f9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..33c6fd73316fda7d26b597a9ac6727f7c65fa235
--- /dev/null
+++ b/graph/incidents_graphml/9/9e891e80-19b7-11ee-af67-f75f54b1c1f9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.246
+ 100.64.52.246
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688398692
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9e891e80-19b7-11ee-af67-f75f54b1c1f9
+
+
+
diff --git a/graph/incidents_graphml/9/9e9b2700-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9e9b2700-9947-11ee-986d-1bbc30865dce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2e45e712ea03596de1727b20831136734630f0ae
--- /dev/null
+++ b/graph/incidents_graphml/9/9e9b2700-9947-11ee-986d-1bbc30865dce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.247
+ 100.64.43.247
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702424337
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9e9b2700-9947-11ee-986d-1bbc30865dce
+
+
+
diff --git a/graph/incidents_graphml/9/9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/9/9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1c69f9aff07467c6ed7c901163d0df3295942fc7
--- /dev/null
+++ b/graph/incidents_graphml/9/9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf.graphml
@@ -0,0 +1,185 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.243
+ 100.64.40.243
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.184.211.180
+ 10.184.211.180
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"]
+
+
+ HOST
+ 100.64.4.110
+ 100.64.4.110
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.28.235
+ 100.64.28.235
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.94.149
+ 100.64.94.149
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+ INCIDENT_LINK
+ 1714983251
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf
+
+
+
diff --git a/graph/incidents_graphml/9/9e9e9f80-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9e9e9f80-6071-11ed-81d5-3f5b5a73c539.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..27581ef01b9ab92fb5c80d596baf57c541c06fcf
--- /dev/null
+++ b/graph/incidents_graphml/9/9e9e9f80-6071-11ed-81d5-3f5b5a73c539.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.77.78
+ 100.64.77.78
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.135
+ 100.64.72.135
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"]
+
+
+ INCIDENT_LINK
+ 1668027662
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e9e9f80-6071-11ed-81d5-3f5b5a73c539
+
+
+ INCIDENT_LINK
+ 1668027662
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9e9e9f80-6071-11ed-81d5-3f5b5a73c539
+
+
+
diff --git a/graph/incidents_graphml/9/9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5.graphml b/graph/incidents_graphml/9/9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5cdaa995d4e2de5e821ac4bf4c53ea932a38779
--- /dev/null
+++ b/graph/incidents_graphml/9/9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5.graphml
@@ -0,0 +1,445 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.37.183
+ 100.64.37.183
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.65
+ 100.64.68.65
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.129
+ 100.64.11.129
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.36
+ 100.64.68.36
+ ["Exploiting Target","Exploiting Host"]
+ 0.6625
+ ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"]
+
+
+ HOST
+ 100.64.12.88
+ 100.64.12.88
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.12
+ 100.64.68.12
+ ["Exploiting Target","Exploiting Host"]
+ 0.81015625
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.70.181
+ 100.64.70.181
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.26
+ 100.64.68.26
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.11.151
+ 100.64.11.151
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.34.111
+ 100.64.34.111
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.14.189
+ 100.64.14.189
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.58.41
+ 100.64.58.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+ INCIDENT_LINK
+ 1696094415
+ malicious
+ 0.81015625
+ 0.81015625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5
+
+
+
diff --git a/graph/incidents_graphml/9/9ebee230-614d-11ee-82b9-21d9d71c2fa4.graphml b/graph/incidents_graphml/9/9ebee230-614d-11ee-82b9-21d9d71c2fa4.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2cd0b4342a26270923d72ddec0a2dcfef6b8d50f
--- /dev/null
+++ b/graph/incidents_graphml/9/9ebee230-614d-11ee-82b9-21d9d71c2fa4.graphml
@@ -0,0 +1,135 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.238
+ 100.64.36.238
+ ["Exploiting Host"]
+ 0.49375
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.68.45
+ 100.64.68.45
+ ["Exploiting Target","Exploiting Host"]
+ 0.746875
+ ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"]
+
+
+ HOST
+ 100.64.37.76
+ 100.64.37.76
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ HOST
+ 100.64.12.136
+ 100.64.12.136
+ ["Exploiting Host","Exploiting Target"]
+ 0.746875
+ ["Precinct","PAN NGFW"]
+
+
+ INCIDENT_LINK
+ 1696269649
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ebee230-614d-11ee-82b9-21d9d71c2fa4
+
+
+ INCIDENT_LINK
+ 1696269649
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ebee230-614d-11ee-82b9-21d9d71c2fa4
+
+
+ INCIDENT_LINK
+ 1696269649
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ebee230-614d-11ee-82b9-21d9d71c2fa4
+
+
+ INCIDENT_LINK
+ 1696269649
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ebee230-614d-11ee-82b9-21d9d71c2fa4
+
+
+ INCIDENT_LINK
+ 1696269649
+ malicious
+ 0.746875
+ 0.746875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ebee230-614d-11ee-82b9-21d9d71c2fa4
+
+
+
diff --git a/graph/incidents_graphml/9/9ecae6e0-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9ecae6e0-49e5-11ee-adbc-ad3007b13df0.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..12132fbd369732a2dad33c5ab9fc536dc7063ae8
--- /dev/null
+++ b/graph/incidents_graphml/9/9ecae6e0-49e5-11ee-adbc-ad3007b13df0.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.33.154
+ 100.64.33.154
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1693696105
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ecae6e0-49e5-11ee-adbc-ad3007b13df0
+
+
+
diff --git a/graph/incidents_graphml/9/9ecf9260-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9ecf9260-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..0ffcc58ffe0a49170741bfa8537a693ce6b00036
--- /dev/null
+++ b/graph/incidents_graphml/9/9ecf9260-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.16.187
+ 100.64.16.187
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.13
+ 100.64.74.13
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766307
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ecf9260-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766307
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9ecf9260-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/9/9ed858f0-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9ed858f0-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f30ae429491c27ed6255be660b5e81f2acc28295
--- /dev/null
+++ b/graph/incidents_graphml/9/9ed858f0-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087737
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ed858f0-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/9/9ed872e0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/9ed872e0-2a11-11ee-ab73-f1f4f0adc079.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6a6c02b9471880bf6901563ec0695f9c0f5ac2dc
--- /dev/null
+++ b/graph/incidents_graphml/9/9ed872e0-2a11-11ee-ab73-f1f4f0adc079.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.140.46.52
+ 10.140.46.52
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.82.124
+ 100.64.82.124
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1690196566
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ed872e0-2a11-11ee-ab73-f1f4f0adc079
+
+
+ INCIDENT_LINK
+ 1690196566
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ed872e0-2a11-11ee-ab73-f1f4f0adc079
+
+
+
diff --git a/graph/incidents_graphml/9/9eda8b10-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9eda8b10-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..15e2adfd88a992ee02f4cbe44be97abc89e4253d
--- /dev/null
+++ b/graph/incidents_graphml/9/9eda8b10-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780418
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9eda8b10-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/9/9eec00f0-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/9eec00f0-ffe3-11ee-b8be-512e5047d566.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e689c950cc5eab933b35055a5412528b1e432c87
--- /dev/null
+++ b/graph/incidents_graphml/9/9eec00f0-ffe3-11ee-b8be-512e5047d566.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.65.167
+ USER-0015-1467.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713706358
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9eec00f0-ffe3-11ee-b8be-512e5047d566
+
+
+
diff --git a/graph/incidents_graphml/9/9eee3a20-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9eee3a20-4191-11ee-b8b0-0f1db008ec38.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8483697b198563bf5f138f7a40bce2049b3032e5
--- /dev/null
+++ b/graph/incidents_graphml/9/9eee3a20-4191-11ee-b8b0-0f1db008ec38.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.229.11
+ 172.30.229.11
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.18.117
+ 100.64.18.117
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692780418
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9eee3a20-4191-11ee-b8b0-0f1db008ec38
+
+
+
diff --git a/graph/incidents_graphml/9/9ef12420-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9ef12420-01c6-11ee-b478-9b612300fc52.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7714ba96bc633ef25411bcb122ce82061475f356
--- /dev/null
+++ b/graph/incidents_graphml/9/9ef12420-01c6-11ee-b478-9b612300fc52.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.41.168
+ 100.64.41.168
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.10.116
+ 100.64.10.116
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685766307
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ef12420-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766307
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ef12420-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766307
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ef12420-01c6-11ee-b478-9b612300fc52
+
+
+ INCIDENT_LINK
+ 1685766307
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ef12420-01c6-11ee-b478-9b612300fc52
+
+
+
diff --git a/graph/incidents_graphml/9/9efca9d0-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9efca9d0-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..10d2941b778da7f8b77aa568fbcc3c79d342445a
--- /dev/null
+++ b/graph/incidents_graphml/9/9efca9d0-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.34.5
+ 100.64.34.5
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087737
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9efca9d0-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/9/9efe5070-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/9efe5070-ffe3-11ee-b8be-512e5047d566.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8f40433c67e30c5fc9121e751afc1ef7e1b2dc7e
--- /dev/null
+++ b/graph/incidents_graphml/9/9efe5070-ffe3-11ee-b8be-512e5047d566.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.65.167
+ USER-0015-1467.example.internal
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1713706358
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9efe5070-ffe3-11ee-b8be-512e5047d566
+
+
+
diff --git a/graph/incidents_graphml/9/9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b5daf9a08a1620ce2dce845dfba36dc6cda1688c
--- /dev/null
+++ b/graph/incidents_graphml/9/9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.19.32
+ 100.64.19.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695978451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..41ef8eb4662d780f71492c847e8230f85463bfd2
--- /dev/null
+++ b/graph/incidents_graphml/9/9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.174.172
+ 172.30.174.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.19.32
+ 100.64.19.32
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1695978451
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02
+
+
+
diff --git a/graph/incidents_graphml/9/9f20d1c0-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9f20d1c0-9947-11ee-986d-1bbc30865dce.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..2d4010a6d030124ecb73c3e3dee290bb52a88461
--- /dev/null
+++ b/graph/incidents_graphml/9/9f20d1c0-9947-11ee-986d-1bbc30865dce.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.43.249
+ 100.64.43.249
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1702424338
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9f20d1c0-9947-11ee-986d-1bbc30865dce
+
+
+
diff --git a/graph/incidents_graphml/9/9f29d770-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/9/9f29d770-26aa-11ef-8ab8-f12e3827fb22.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..56ed070c5d054d63ba1ee9e3d23cd7557f76033a
--- /dev/null
+++ b/graph/incidents_graphml/9/9f29d770-26aa-11ef-8ab8-f12e3827fb22.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.45.22
+ 100.64.45.22
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717969972
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f29d770-26aa-11ef-8ab8-f12e3827fb22
+
+
+
diff --git a/graph/incidents_graphml/9/9f313030-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/9f313030-020f-11ee-be0c-f125b7f6022a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..26ff706bf0e60d9a303d03617402e7c383b5f85a
--- /dev/null
+++ b/graph/incidents_graphml/9/9f313030-020f-11ee-be0c-f125b7f6022a.graphml
@@ -0,0 +1,509 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.30.74
+ 100.64.30.74
+ ["Exploiting Host"]
+ 0.68359375
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.72
+ 100.64.74.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.73
+ 100.64.74.73
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.73
+ USER-0015-1672.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.72.177
+ 100.64.72.177
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.74
+ 100.64.74.74
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.30.215
+ 100.64.30.215
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.75
+ 100.64.74.75
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.238
+ 100.64.71.238
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.68.223
+ 100.64.68.223
+ ["Exploiting Host","Exploiting Target"]
+ 0.841796875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.76
+ 100.64.74.76
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.71.147
+ 100.64.71.147
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"]
+
+
+ HOST
+ 100.64.48.93
+ 100.64.48.93
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"]
+
+
+ HOST
+ 100.64.74.77
+ 100.64.74.77
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki","Stealthwatch"]
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+ INCIDENT_LINK
+ 1685797661
+ malicious
+ 0.841796875
+ 0.841796875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f313030-020f-11ee-be0c-f125b7f6022a
+
+
+
diff --git a/graph/incidents_graphml/9/9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/9/9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..ff3c6ada29c1f8f4dffa14b42aa12cc8d3cc119d
--- /dev/null
+++ b/graph/incidents_graphml/9/9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.191
+ 100.64.9.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1708860347
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7
+
+
+
diff --git a/graph/incidents_graphml/9/9f3ee380-f7ee-11ee-af87-d52023252f4a.graphml b/graph/incidents_graphml/9/9f3ee380-f7ee-11ee-af87-d52023252f4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bdd7d1445e285ffd69ba99c997f0d72a70fcdaed
--- /dev/null
+++ b/graph/incidents_graphml/9/9f3ee380-f7ee-11ee-af87-d52023252f4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.52.124
+ 100.64.52.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712831474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f3ee380-f7ee-11ee-af87-d52023252f4a
+
+
+
diff --git a/graph/incidents_graphml/9/9f41b490-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9f41b490-df82-11ee-8f11-296badf765d8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7614a82a01bcf0dfbe499610c25912fe6a3f55de
--- /dev/null
+++ b/graph/incidents_graphml/9/9f41b490-df82-11ee-8f11-296badf765d8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.21.46
+ 100.64.21.46
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.40.149
+ 172.29.40.149
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1710146260
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f41b490-df82-11ee-8f11-296badf765d8
+
+
+
diff --git a/graph/incidents_graphml/9/9f4dd790-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/9/9f4dd790-85f3-11ee-b40b-bf8e12a3a664.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..23d1c331643af0df1bafb9f559a9b260864b86af
--- /dev/null
+++ b/graph/incidents_graphml/9/9f4dd790-85f3-11ee-b40b-bf8e12a3a664.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.248
+ 100.64.7.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700299189
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9f4dd790-85f3-11ee-b40b-bf8e12a3a664
+
+
+
diff --git a/graph/incidents_graphml/9/9f566320-f7ee-11ee-af87-d52023252f4a.graphml b/graph/incidents_graphml/9/9f566320-f7ee-11ee-af87-d52023252f4a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f72a6a6103a8dd32d7ca04c9a71a816d1abd371b
--- /dev/null
+++ b/graph/incidents_graphml/9/9f566320-f7ee-11ee-af87-d52023252f4a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.52.124
+ 100.64.52.124
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1712831474
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9f566320-f7ee-11ee-af87-d52023252f4a
+
+
+
diff --git a/graph/incidents_graphml/9/9f5c5c60-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f5c5c60-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..5425309d5ae1fe55b5e7bb6bd26ec7629cd573ce
--- /dev/null
+++ b/graph/incidents_graphml/9/9f5c5c60-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.9
+ 100.64.55.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170769
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f5c5c60-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9f699e40-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9f699e40-085b-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d41aceaf33f80be6f934e9847d9c27a0b0cdfb74
--- /dev/null
+++ b/graph/incidents_graphml/9/9f699e40-085b-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.14.202
+ 100.64.14.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714637508
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f699e40-085b-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/9/9f6ae2e0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9f6ae2e0-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..e80be28362c2992842d2678f329e2393c1612e0d
--- /dev/null
+++ b/graph/incidents_graphml/9/9f6ae2e0-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.179
+ 100.64.15.179
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495164
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9f6ae2e0-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/9/9f6c4230-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/9/9f6c4230-a2d5-11ee-8541-6f03abc6c851.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..4d7764773264010623226f4ab10ca1c02b6e603c
--- /dev/null
+++ b/graph/incidents_graphml/9/9f6c4230-a2d5-11ee-8541-6f03abc6c851.graphml
@@ -0,0 +1,503 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.129
+ 100.64.29.129
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.130
+ USER-0015-1280.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.131
+ 100.64.29.131
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 192.0.2.58
+ 192.0.2.58
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.132
+ 100.64.29.132
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.47
+ 100.64.10.47
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.133
+ 100.64.29.133
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.134
+ 100.64.29.134
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.78.41
+ 172.31.78.41
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.20.102
+ 100.64.20.102
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.135
+ 100.64.29.135
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.136
+ 100.64.29.136
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.137
+ 100.64.29.137
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.138
+ 100.64.29.138
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+ INCIDENT_LINK
+ 1703474888
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c4230-a2d5-11ee-8541-6f03abc6c851
+
+
+
diff --git a/graph/incidents_graphml/9/9f6c8820-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/9f6c8820-ee05-11ec-963b-2fbb8aeb8168.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f09f590681df9dd40b9f0ab322fa220d8c687461
--- /dev/null
+++ b/graph/incidents_graphml/9/9f6c8820-ee05-11ec-963b-2fbb8aeb8168.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.73.220
+ 100.64.73.220
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.1.166
+ USER-0015-1615.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655446845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c8820-ee05-11ec-963b-2fbb8aeb8168
+
+
+ INCIDENT_LINK
+ 1655446845
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f6c8820-ee05-11ec-963b-2fbb8aeb8168
+
+
+
diff --git a/graph/incidents_graphml/9/9f6cfe30-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f6cfe30-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f4b53aa5d2049f6ebcdffee3e5ab90b2ad78c78f
--- /dev/null
+++ b/graph/incidents_graphml/9/9f6cfe30-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.55.9
+ 100.64.55.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170769
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9f6cfe30-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9f72d030-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/9/9f72d030-117d-11ee-b107-2764325d5a51.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f06755bd6ff00bb506a0d96a13eb3fe1d38c519b
--- /dev/null
+++ b/graph/incidents_graphml/9/9f72d030-117d-11ee-b107-2764325d5a51.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.36.164
+ USER-0015-1441.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1687494173
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f72d030-117d-11ee-b107-2764325d5a51
+
+
+ INCIDENT_LINK
+ 1687494173
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f72d030-117d-11ee-b107-2764325d5a51
+
+
+
diff --git a/graph/incidents_graphml/9/9f7a4010-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9f7a4010-085b-11ef-bd54-61e579a3d29b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ae819014549faf1c7795a5c62dcc0951cf04ed8
--- /dev/null
+++ b/graph/incidents_graphml/9/9f7a4010-085b-11ef-bd54-61e579a3d29b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.29.1.127
+ 172.29.1.127
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.14.202
+ 100.64.14.202
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1714637508
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9f7a4010-085b-11ef-bd54-61e579a3d29b
+
+
+
diff --git a/graph/incidents_graphml/9/9f7aca80-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/9/9f7aca80-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e7effa50b440f4da503b81beb31e94fbd02834c
--- /dev/null
+++ b/graph/incidents_graphml/9/9f7aca80-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.9.205
+ 100.64.9.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458297
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f7aca80-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/9/9f7bcb40-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f7bcb40-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..54e4bceb085463f61d5ca10821208117817c9ab6
--- /dev/null
+++ b/graph/incidents_graphml/9/9f7bcb40-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.9
+ 100.64.55.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170769
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f7bcb40-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9f7ed9e0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9f7ed9e0-6068-11ee-9912-3b4bbb38327a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..1ae5d2f611b9330d80b4fee7c7ccc66f38f2918c
--- /dev/null
+++ b/graph/incidents_graphml/9/9f7ed9e0-6068-11ee-9912-3b4bbb38327a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.248
+ 100.64.67.248
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1696171296
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f7ed9e0-6068-11ee-9912-3b4bbb38327a
+
+
+
diff --git a/graph/incidents_graphml/9/9f7f9d40-2e77-11ed-9a52-4b27bf417805.graphml b/graph/incidents_graphml/9/9f7f9d40-2e77-11ed-9a52-4b27bf417805.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..116e7b3b115617ed12fbe4499ff9b0b0950d3e8e
--- /dev/null
+++ b/graph/incidents_graphml/9/9f7f9d40-2e77-11ed-9a52-4b27bf417805.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.84.227
+ 100.64.84.227
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.55.52.223
+ 10.55.52.223
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1662532683
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f7f9d40-2e77-11ed-9a52-4b27bf417805
+
+
+
diff --git a/graph/incidents_graphml/9/9f803fa0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9f803fa0-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..384567ae5e357db3994e5bcff4d1bb814ad02ec7
--- /dev/null
+++ b/graph/incidents_graphml/9/9f803fa0-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,107 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.180
+ 100.64.29.180
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.247.113
+ 172.24.247.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.27.202.53
+ 172.27.202.53
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495164
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f803fa0-0867-11ee-aafb-9397a5ec7d32
+
+
+ INCIDENT_LINK
+ 1686495164
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f803fa0-0867-11ee-aafb-9397a5ec7d32
+
+
+ INCIDENT_LINK
+ 1686495164
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9f803fa0-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/9/9f8c0890-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/9/9f8c0890-3ea3-11ee-a794-3d0dc768f48a.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..7f924858c70c6a922cdda17f831b20938cf409bb
--- /dev/null
+++ b/graph/incidents_graphml/9/9f8c0890-3ea3-11ee-a794-3d0dc768f48a.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.18.38.152
+ 172.18.38.152
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.9.205
+ 100.64.9.205
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1692458297
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9f8c0890-3ea3-11ee-a794-3d0dc768f48a
+
+
+
diff --git a/graph/incidents_graphml/9/9f8d5770-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f8d5770-84c8-11ee-89b4-37c02fa13bd9.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..8213d3c3d3e38df698796f9ac5cc90a7f26c0286
--- /dev/null
+++ b/graph/incidents_graphml/9/9f8d5770-84c8-11ee-89b4-37c02fa13bd9.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.55.9
+ 100.64.55.9
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1700170770
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9f8d5770-84c8-11ee-89b4-37c02fa13bd9
+
+
+
diff --git a/graph/incidents_graphml/9/9fa5c900-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9fa5c900-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bc60cdb921ad3743989e9d12f01e3aeb3cc3e7a5
--- /dev/null
+++ b/graph/incidents_graphml/9/9fa5c900-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.23.86.34
+ 172.23.86.34
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.29.180
+ 100.64.29.180
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495164
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9fa5c900-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/9/9fa6fa90-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/9/9fa6fa90-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..6d4de6b5a261644fb901ad6b15e07e5f0d8ece23
--- /dev/null
+++ b/graph/incidents_graphml/9/9fa6fa90-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.25.222.10
+ 172.25.222.10
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.127
+ 100.64.10.127
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703519
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9fa6fa90-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/9/9fae1fe0-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9fae1fe0-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..809f6a73916ad9a5673b9c0c5441cd01421a1ac8
--- /dev/null
+++ b/graph/incidents_graphml/9/9fae1fe0-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.79.173
+ 100.64.79.173
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.82
+ 100.64.71.82
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9fae1fe0-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370395
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9fae1fe0-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/9/9fb83200-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9fb83200-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..804a0b63fd2a848f864840532aa5b9922a7ce896
--- /dev/null
+++ b/graph/incidents_graphml/9/9fb83200-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.76.118
+ 100.64.76.118
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.72
+ 100.64.73.72
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fb83200-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370395
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fb83200-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/9/9fbd6220-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9fbd6220-ed53-11ec-8964-796320a841f1.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..faf1ff9f666f61f7633077b5884906430600bd2c
--- /dev/null
+++ b/graph/incidents_graphml/9/9fbd6220-ed53-11ec-8964-796320a841f1.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.28.218
+ 100.64.28.218
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.70.228
+ 100.64.70.228
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1655370395
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fbd6220-ed53-11ec-8964-796320a841f1
+
+
+ INCIDENT_LINK
+ 1655370395
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fbd6220-ed53-11ec-8964-796320a841f1
+
+
+
diff --git a/graph/incidents_graphml/9/9fbdddf0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/9/9fbdddf0-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..034a9b02f606f00912f6c3cacaff27e249089873
--- /dev/null
+++ b/graph/incidents_graphml/9/9fbdddf0-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.135.251.191
+ 10.135.251.191
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.129
+ 100.64.10.129
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703519
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9fbdddf0-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/9/9fc0cb10-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9fc0cb10-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cf5a1dd73a14d7a78e39d9f15d107f9be9f80afa
--- /dev/null
+++ b/graph/incidents_graphml/9/9fc0cb10-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.7.147
+ 100.64.7.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ 9fc0cb10-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/9/9fceb4d0-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/9/9fceb4d0-0c38-11ee-9256-6d0394834f57.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..96fd40871ac351d3e97b5e7867ae788194e7367b
--- /dev/null
+++ b/graph/incidents_graphml/9/9fceb4d0-0c38-11ee-9256-6d0394834f57.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.29.49
+ 100.64.29.49
+ ["Exploiting Host","Exploiting Target"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.33.161
+ 100.64.33.161
+ ["Exploiting Host","Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686914783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fceb4d0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fceb4d0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fceb4d0-0c38-11ee-9256-6d0394834f57
+
+
+ INCIDENT_LINK
+ 1686914783
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fceb4d0-0c38-11ee-9256-6d0394834f57
+
+
+
diff --git a/graph/incidents_graphml/9/9fd6e430-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/9/9fd6e430-120d-11ef-818b-4176151696b3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..067886a4cedd006da77440845954b92bbf7c846b
--- /dev/null
+++ b/graph/incidents_graphml/9/9fd6e430-120d-11ef-818b-4176151696b3.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.10.131
+ 100.64.10.131
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1715703519
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9fd6e430-120d-11ef-818b-4176151696b3
+
+
+
diff --git a/graph/incidents_graphml/9/9fe78cf0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9fe78cf0-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c6485e049c18b26b403692d70538eb3e46efab30
--- /dev/null
+++ b/graph/incidents_graphml/9/9fe78cf0-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.22.127.96
+ 172.22.127.96
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.7.147
+ 100.64.7.147
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9fe78cf0-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/9/9fed67b0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9fed67b0-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..545a3b98a9cb150c0e527d7f59864dc47b78c444
--- /dev/null
+++ b/graph/incidents_graphml/9/9fed67b0-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.86.42
+ 100.64.86.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678139306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9fed67b0-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/9/9ff074f0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ff074f0-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..9e2588a831b5d3d93269a495bdc6b3729517d6f3
--- /dev/null
+++ b/graph/incidents_graphml/9/9ff074f0-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.207.79.45
+ 100.64.84.55
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.86.42
+ 100.64.86.42
+ ["Exploiting Host"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139306
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ff074f0-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/9/9ff25f40-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/9/9ff25f40-22d3-11ef-b7cc-27d8681b231b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..c0e650d4323d00a1d5621066e65c72883e925649
--- /dev/null
+++ b/graph/incidents_graphml/9/9ff25f40-22d3-11ef-b7cc-27d8681b231b.graphml
@@ -0,0 +1,113 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.21.57.69
+ 172.21.57.69
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch","Barracuda WAF"]
+
+
+ HOST
+ 100.64.1.138
+ 100.64.1.138
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.89.240
+ 100.64.89.240
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1717547778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ff25f40-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ff25f40-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ff25f40-22d3-11ef-b7cc-27d8681b231b
+
+
+ INCIDENT_LINK
+ 1717547778
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ff25f40-22d3-11ef-b7cc-27d8681b231b
+
+
+
diff --git a/graph/incidents_graphml/9/9ff270c0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ff270c0-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..bf1c7969ea20155da6b2f4e9fb8a4f5bd2ba1d58
--- /dev/null
+++ b/graph/incidents_graphml/9/9ff270c0-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.88.202
+ 100.64.88.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ INCIDENT_LINK
+ 1678139306
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ff270c0-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/9/9ff3cae0-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9ff3cae0-2885-11ee-ab6d-398d68629c7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..d1049b8718282ba6518ac3ccb337f5dba98cf31f
--- /dev/null
+++ b/graph/incidents_graphml/9/9ff3cae0-2885-11ee-ab6d-398d68629c7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.182.227
+ 172.31.182.227
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.48.89
+ 100.64.48.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690026487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9ff3cae0-2885-11ee-ab6d-398d68629c7b
+
+
+
diff --git a/graph/incidents_graphml/9/9ff57e00-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ff57e00-bc68-11ed-b487-1b4dcbdf8241.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..957d4fd8531fc7a4f5167246e7061dd9af1667ce
--- /dev/null
+++ b/graph/incidents_graphml/9/9ff57e00-bc68-11ed-b487-1b4dcbdf8241.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 10.113.78.104
+ 10.113.78.104
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","ASA Firewall","Barracuda WAF"]
+
+
+ HOST
+ 100.64.88.202
+ 100.64.88.202
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1678139306
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ 9ff57e00-bc68-11ed-b487-1b4dcbdf8241
+
+
+
diff --git a/graph/incidents_graphml/9/9ff8a7e0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/9/9ff8a7e0-300f-11ee-bf6d-f1637ddc586f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..daeb82533f69f3414a1f333a58b56aaee560340b
--- /dev/null
+++ b/graph/incidents_graphml/9/9ff8a7e0-300f-11ee-bf6d-f1637ddc586f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.22.113
+ 100.64.22.113
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.77
+ 100.64.73.77
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki","Umbrella"]
+
+
+ INCIDENT_LINK
+ 1690855416
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ 9ff8a7e0-300f-11ee-bf6d-f1637ddc586f
+
+
+
diff --git a/graph/incidents_graphml/9/9ffb2e10-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9ffb2e10-16e3-11ee-8363-57b2dccea5f8.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..068a3bd02f704d2b0b89a80001c07620d51455a6
--- /dev/null
+++ b/graph/incidents_graphml/9/9ffb2e10-16e3-11ee-8363-57b2dccea5f8.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.34.7
+ 100.64.34.7
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.6.172
+ 172.31.6.172
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1688087739
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ 9ffb2e10-16e3-11ee-8363-57b2dccea5f8
+
+
+
diff --git a/graph/incidents_graphml/a/a000d370-d6a5-11ed-836d-79bb3a962e0f.graphml b/graph/incidents_graphml/a/a000d370-d6a5-11ed-836d-79bb3a962e0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..b05a6f8ba4fe3b717f0b2f525f44ed8336786d5d
--- /dev/null
+++ b/graph/incidents_graphml/a/a000d370-d6a5-11ed-836d-79bb3a962e0f.graphml
@@ -0,0 +1,315 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.11.234
+ 100.64.11.234
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.191.229
+ 172.24.191.229
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.191
+ 100.64.23.191
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.24.217.8
+ 172.24.217.8
+ ["Exploiting Target","Exploiting Host"]
+ 0.9208984375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.192
+ 100.64.23.192
+ ["Exploiting Target"]
+ 0.4375
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.193
+ 100.64.23.193
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.23.194
+ 100.64.23.194
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.9208984375
+ 0.9208984375
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a000d370-d6a5-11ed-836d-79bb3a962e0f
+
+
+
diff --git a/graph/incidents_graphml/a/a00c5300-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a00c5300-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..f225ab73aa78add36d0fb26d1ca836bf0d7000be
--- /dev/null
+++ b/graph/incidents_graphml/a/a00c5300-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.67.44
+ USER-0015-1486.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a00c5300-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/a/a00d7da0-d6a5-11ed-836d-79bb3a962e0f.graphml b/graph/incidents_graphml/a/a00d7da0-d6a5-11ed-836d-79bb3a962e0f.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..a5d81fa93c8cd7c16280b213c6d1b5f0851a292f
--- /dev/null
+++ b/graph/incidents_graphml/a/a00d7da0-d6a5-11ed-836d-79bb3a962e0f.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.16.233.43
+ 172.16.233.43
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.15.80
+ 100.64.15.80
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1681024236
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a00d7da0-d6a5-11ed-836d-79bb3a962e0f
+
+
+
diff --git a/graph/incidents_graphml/a/a018b800-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/a/a018b800-2885-11ee-ab6d-398d68629c7b.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..59c3b5d124db9ba02db2f3cdfec39199cbbc5566
--- /dev/null
+++ b/graph/incidents_graphml/a/a018b800-2885-11ee-ab6d-398d68629c7b.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.48.89
+ 100.64.48.89
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.21.61.66
+ 172.21.61.66
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1690026487
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a018b800-2885-11ee-ab6d-398d68629c7b
+
+
+
diff --git a/graph/incidents_graphml/a/a01e4bf0-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a01e4bf0-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..cfafbd7844ec07b033f41d6807b4bfd6f9eb984c
--- /dev/null
+++ b/graph/incidents_graphml/a/a01e4bf0-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.24.190
+ 100.64.24.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638423
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a01e4bf0-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a02bc1e0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a02bc1e0-0867-11ee-aafb-9397a5ec7d32.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..320fcc78e485fa4ba979d14a70855ac195ef3fe4
--- /dev/null
+++ b/graph/incidents_graphml/a/a02bc1e0-0867-11ee-aafb-9397a5ec7d32.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.30.208.219
+ 172.30.208.219
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.67.44
+ USER-0015-1486.example.internal
+ ["Exploiting Host"]
+ 0.25
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1686495165
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Unprocessed
+ a02bc1e0-0867-11ee-aafb-9397a5ec7d32
+
+
+
diff --git a/graph/incidents_graphml/a/a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/a/a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adead07ec6ad0e6158e4c9f892a59b1ff2317adf
--- /dev/null
+++ b/graph/incidents_graphml/a/a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2.graphml
@@ -0,0 +1,77 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.81.217
+ 100.64.81.217
+ ["Exploiting Host","Exploiting Target"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.73.60
+ 100.64.73.60
+ ["Exploiting Target","Exploiting Host"]
+ 0.25
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1656543781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+ INCIDENT_LINK
+ 1656543781
+ malicious
+ 0.7
+ 0.25
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Unprocessed
+ a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2
+
+
+
diff --git a/graph/incidents_graphml/a/a0304d50-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a0304d50-5277-11ee-99e4-0dae236ad26e.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..97679de6a09f5187cb0c2f1d1a98156d4dc6eee2
--- /dev/null
+++ b/graph/incidents_graphml/a/a0304d50-5277-11ee-99e4-0dae236ad26e.graphml
@@ -0,0 +1,63 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 172.31.101.1
+ 172.31.101.1
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ HOST
+ 100.64.24.190
+ 100.64.24.190
+ ["Exploiting Target","Exploiting Host"]
+ 0.71875
+ ["Precinct","ASA Firewall"]
+
+
+ INCIDENT_LINK
+ 1694638423
+ malicious
+ 0.71875
+ 0.71875
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Target","Exploiting Host"]
+ complete-mission
+ Disrupted
+ a0304d50-5277-11ee-99e4-0dae236ad26e
+
+
+
diff --git a/graph/incidents_graphml/a/a03685c0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/a/a03685c0-238e-11ee-8f53-17c8a7373bd3.graphml
new file mode 100644
index 0000000000000000000000000000000000000000..adf0cd0ecd9b9c09f352df0d508b3308f076608e
--- /dev/null
+++ b/graph/incidents_graphml/a/a03685c0-238e-11ee-8f53-17c8a7373bd3.graphml
@@ -0,0 +1,293 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ HOST
+ 100.64.40.51
+ 100.64.40.51
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.104
+ USER-0015-1635.example.internal
+ ["Exploiting Host","Exploiting Target"]
+ 0.71875
+ ["Precinct","Umbrella","Meraki"]
+
+
+ HOST
+ 100.64.72.105
+ 100.64.72.105
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.55.48
+ 100.64.55.48
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.71.237
+ 100.64.71.237
+ ["Exploiting Target","Exploiting Host"]
+ 0.7890625
+ ["Precinct","Meraki","Umbrella"]
+
+
+ HOST
+ 100.64.37.94
+ 100.64.37.94
+ ["Exploiting Host","Exploiting Target"]
+ 0.7890625
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.72.106
+ 100.64.72.106
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ HOST
+ 100.64.15.227
+ 100.64.15.227
+ ["Exploiting Host"]
+ 0.578125
+ ["Precinct","Meraki"]
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+ INCIDENT_LINK
+ 1689480597
+ malicious
+ 0.7890625
+ 0.7890625
+ Data Theft
+ ["T1190","T1041","T1567"]
+ ["TA0001","TA0002","TA0009","TA0010"]
+ ["Exploiting Host","Exploiting Target"]
+ complete-mission
+ Disrupted
+ a03685c0-238e-11ee-8f53-17c8a7373bd3
+
+
+