diff --git a/graph/incidents_graphml/9/96150540-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96150540-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dc466f2dc8bde7edb6831cb19e20c6d660ab1d9 --- /dev/null +++ b/graph/incidents_graphml/9/96150540-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.51 + 100.64.40.51 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348427 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96150540-1942-11ee-b83b-5979e1f254c2 + + + INCIDENT_LINK + 1688348427 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96150540-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/96171770-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/96171770-ab16-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..45f0801ecb41d0cbcad55df8b3252032aedac34b --- /dev/null +++ b/graph/incidents_graphml/9/96171770-ab16-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.244 + USER-0015-1972.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1704382399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96171770-ab16-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/9/96175dc0-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/96175dc0-2816-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5518ee52364478b93ef8142077b5b042107d0680 --- /dev/null +++ b/graph/incidents_graphml/9/96175dc0-2816-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.165 + 100.64.30.165 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718126294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96175dc0-2816-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/9/961ea510-c054-11ed-96c1-674c48144fee.graphml b/graph/incidents_graphml/9/961ea510-c054-11ed-96c1-674c48144fee.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c2646ed562acf6f36745c0a580f210ac16586e1 --- /dev/null +++ b/graph/incidents_graphml/9/961ea510-c054-11ed-96c1-674c48144fee.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.238 + 100.64.69.238 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host","Ransomware Source","Ransomware Target"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","Advanced Malware Protection (AMP)"] + + + INCIDENT_LINK + 1678570504 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1486","T1041","T1567"] + ["TA0001","TA0002","TA0040","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Ransomware Source","Ransomware Target"] + complete-mission + Unprocessed + 961ea510-c054-11ed-96c1-674c48144fee + + + diff --git a/graph/incidents_graphml/9/96200570-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/96200570-f3c2-11ee-b267-b349fce9e52a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..509001263e44728ec35f97a7e2fabd5a3a04061c --- /dev/null +++ b/graph/incidents_graphml/9/96200570-f3c2-11ee-b267-b349fce9e52a.graphml @@ -0,0 +1,791 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.176 + 100.64.5.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.202 + 100.64.11.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.23 + 100.64.13.23 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.24 + 100.64.13.24 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.12 + 100.64.2.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.115 + 100.64.4.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.25 + 100.64.13.25 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.26 + 100.64.13.26 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.27 + 100.64.13.27 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.28 + 100.64.13.28 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.29 + 100.64.13.29 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.235 + 100.64.10.235 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.42 + 100.64.13.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.43 + 100.64.13.43 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.44 + 100.64.13.44 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.45 + 100.64.13.45 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.13.46 + 100.64.13.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + INCIDENT_LINK + 1712372756 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96200570-f3c2-11ee-b267-b349fce9e52a + + + diff --git a/graph/incidents_graphml/9/96230380-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96230380-1617-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a580a00fde472ab30343a8f6c1e97ea1f57f60e9 --- /dev/null +++ b/graph/incidents_graphml/9/96230380-1617-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.22 + USER-0015-1296.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000105 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96230380-1617-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/9/96264240-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/96264240-14d6-11ed-9c5d-cfc137bdc6da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..50c387d6cb10d3e08910c9b4c2c4beea29bcde54 --- /dev/null +++ b/graph/incidents_graphml/9/96264240-14d6-11ed-9c5d-cfc137bdc6da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.106 + 100.64.76.106 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659714739 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96264240-14d6-11ed-9c5d-cfc137bdc6da + + + diff --git a/graph/incidents_graphml/9/96291100-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/96291100-2816-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce3cd006973fc9d49608278c99e2e254a3147b10 --- /dev/null +++ b/graph/incidents_graphml/9/96291100-2816-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.165 + 100.64.30.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718126294 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96291100-2816-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/9/962aaed0-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/962aaed0-e2e2-11ee-b0e0-350848617e5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc4843b1d43b7a3759a699d4c0824c0dc59849b7 --- /dev/null +++ b/graph/incidents_graphml/9/962aaed0-e2e2-11ee-b0e0-350848617e5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.46 + 100.64.30.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710517330 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 962aaed0-e2e2-11ee-b0e0-350848617e5b + + + diff --git a/graph/incidents_graphml/9/962b14a0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/962b14a0-ab16-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..89d3abf257facd838748e117ee6fac098313ada2 --- /dev/null +++ b/graph/incidents_graphml/9/962b14a0-ab16-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.85.244 + USER-0015-1972.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704382399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 962b14a0-ab16-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/9/962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13a596528709a54a6c64ee4824be471f40465f72 --- /dev/null +++ b/graph/incidents_graphml/9/962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.185 + USER-0015-1773.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657051000 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 962d1f40-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/962ea7c0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/962ea7c0-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..006caabd36ec4dc5ea26279b1e0676e13cfcdf20 --- /dev/null +++ b/graph/incidents_graphml/9/962ea7c0-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.51 + 100.64.40.51 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348427 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 962ea7c0-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/9637f580-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/9637f580-14d6-11ed-9c5d-cfc137bdc6da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96caa915522b29b79db4eb9ad386f7ce0918c902 --- /dev/null +++ b/graph/incidents_graphml/9/9637f580-14d6-11ed-9c5d-cfc137bdc6da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.106 + 100.64.76.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659714739 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9637f580-14d6-11ed-9c5d-cfc137bdc6da + + + diff --git a/graph/incidents_graphml/9/9639c970-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/9639c970-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..383e7e681196426c1b8c0454b30d68a637d02bbf --- /dev/null +++ b/graph/incidents_graphml/9/9639c970-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.249 + USER-0015-1774.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657051000 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9639c970-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/963af320-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/963af320-ab16-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ccb46b6c3c6638aa1395acf3e325bf94a91913f0 --- /dev/null +++ b/graph/incidents_graphml/9/963af320-ab16-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.23 + 100.64.54.23 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1704382399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 963af320-ab16-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/9/963b9ec0-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/963b9ec0-e2e2-11ee-b0e0-350848617e5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5ea551eb863307be51b6880485d2d7e5e6113e1 --- /dev/null +++ b/graph/incidents_graphml/9/963b9ec0-e2e2-11ee-b0e0-350848617e5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.46 + 100.64.30.46 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710517330 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 963b9ec0-e2e2-11ee-b0e0-350848617e5b + + + diff --git a/graph/incidents_graphml/9/963d13e0-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/963d13e0-6fab-11ee-8e98-1955c57dee13.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d87e4b4beef3fa64c11adb75f6f6cac6ea9f93cc --- /dev/null +++ b/graph/incidents_graphml/9/963d13e0-6fab-11ee-8e98-1955c57dee13.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.6.30 + 100.64.6.30 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697849324 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 963d13e0-6fab-11ee-8e98-1955c57dee13 + + + diff --git a/graph/incidents_graphml/9/9642f310-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/9642f310-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fa5b9a96eeb6e800e6f411211de2e8aa5020817 --- /dev/null +++ b/graph/incidents_graphml/9/9642f310-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.69 + 100.64.49.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348427 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9642f310-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/964736f0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/964736f0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d654be8122a79573ace0338fb4582733f8066bf9 --- /dev/null +++ b/graph/incidents_graphml/9/964736f0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.249 + USER-0015-1774.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657051000 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 964736f0-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/9649bf50-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/9649bf50-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bcd635e7e7c619953e8a2016352f0a567d529dc --- /dev/null +++ b/graph/incidents_graphml/9/9649bf50-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.184 + 100.64.52.184 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971003 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9649bf50-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/964b6bc0-6fab-11ee-8e98-1955c57dee13.graphml b/graph/incidents_graphml/9/964b6bc0-6fab-11ee-8e98-1955c57dee13.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cedcb6c80ce5afb13a62b4c913a539eb105b9052 --- /dev/null +++ b/graph/incidents_graphml/9/964b6bc0-6fab-11ee-8e98-1955c57dee13.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.30 + 100.64.6.30 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697849324 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 964b6bc0-6fab-11ee-8e98-1955c57dee13 + + + diff --git a/graph/incidents_graphml/9/9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..61a92b29b59f9e8f21f3b888781f68114b850650 --- /dev/null +++ b/graph/incidents_graphml/9/9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.71 + 100.64.78.71 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.78.72 + 100.64.78.72 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657051000 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051000 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9650acd0-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/965272c0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/965272c0-ab16-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d736b249163b33ecb0ac3771101ee21017ae20c --- /dev/null +++ b/graph/incidents_graphml/9/965272c0-ab16-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.54.23 + 100.64.54.23 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704382399 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 965272c0-ab16-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/9/9652bc50-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/9652bc50-5560-11ee-8e2f-e12aa4f0d6f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da23031b841407c958c3d20727bec189d646370b --- /dev/null +++ b/graph/incidents_graphml/9/9652bc50-5560-11ee-8e2f-e12aa4f0d6f4.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.217 + 100.64.18.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.213 + 100.64.20.213 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.180 + 100.64.35.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.55 + USER-0015-1347.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.254 + 100.64.10.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.69 + 100.64.45.69 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.43 + 100.64.14.43 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958382 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9652bc50-5560-11ee-8e2f-e12aa4f0d6f4 + + + diff --git a/graph/incidents_graphml/9/96586550-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/96586550-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a6e9794e387e3a12a7a2d7d4498aaa149620fcf --- /dev/null +++ b/graph/incidents_graphml/9/96586550-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.184 + 100.64.52.184 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971004 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96586550-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/96623ae0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96623ae0-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..922f04bbd7fcc5ac90ae75012f229653ca90d790 --- /dev/null +++ b/graph/incidents_graphml/9/96623ae0-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.69 + 100.64.49.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348427 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96623ae0-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/96666ff0-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/96666ff0-ab16-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..991dd39543e8b671597543953f36ff2ed78748be --- /dev/null +++ b/graph/incidents_graphml/9/96666ff0-ab16-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.245 + USER-0015-1973.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1704382399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96666ff0-ab16-11ee-ace1-1bcda4a2f9d1 + + + INCIDENT_LINK + 1704382399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96666ff0-ab16-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/9/9669a360-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/9669a360-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fd35777dd9c963cb7a9a315aeb01f5f0a7057e9 --- /dev/null +++ b/graph/incidents_graphml/9/9669a360-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.185 + 100.64.52.185 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971004 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9669a360-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae22d7b0d4ff9c8209ad2fa6aaa5c1f390b812f2 --- /dev/null +++ b/graph/incidents_graphml/9/966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.78 + USER-0015-1775.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1657051001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 966dd1c0-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7877b7fe8dfd039a60399e0f80a9c6e9658ff644 --- /dev/null +++ b/graph/incidents_graphml/9/9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.78 + USER-0015-1775.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657051001 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9672dad0-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/967f0100-ab16-11ee-ace1-1bcda4a2f9d1.graphml b/graph/incidents_graphml/9/967f0100-ab16-11ee-ace1-1bcda4a2f9d1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9016f0deb2ed6810dc2585fba6de3f7557a4811a --- /dev/null +++ b/graph/incidents_graphml/9/967f0100-ab16-11ee-ace1-1bcda4a2f9d1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 192.168.5.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","Stealthwatch"] + + + HOST + 100.64.85.245 + USER-0015-1973.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1704382399 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 967f0100-ab16-11ee-ace1-1bcda4a2f9d1 + + + diff --git a/graph/incidents_graphml/9/969001a0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/969001a0-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5cdb835aa6d1c85ea01325696d95c61cd00f62b --- /dev/null +++ b/graph/incidents_graphml/9/969001a0-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.71 + USER-0015-1380.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348428 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 969001a0-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/96a5ec20-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/96a5ec20-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4cf33783a1354a081bf9f7f83535f13a67fa846c --- /dev/null +++ b/graph/incidents_graphml/9/96a5ec20-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.250 + 100.64.36.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96a5ec20-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/96a6fd00-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/96a6fd00-79e2-11ee-9fa1-09d380781a0d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9de6e680c31495263843be9787c35989f545e57c --- /dev/null +++ b/graph/incidents_graphml/9/96a6fd00-79e2-11ee-9fa1-09d380781a0d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.236 + 100.64.9.236 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698972459 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96a6fd00-79e2-11ee-9fa1-09d380781a0d + + + diff --git a/graph/incidents_graphml/9/96a9cb30-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96a9cb30-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4a69dcd4eea81cd033e545ac2e9e5b65d04c1d2 --- /dev/null +++ b/graph/incidents_graphml/9/96a9cb30-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348428 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96a9cb30-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/96b66650-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/96b66650-79e2-11ee-9fa1-09d380781a0d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..09e8fa2db7c07efb30519021b12338e2f7e6b0f2 --- /dev/null +++ b/graph/incidents_graphml/9/96b66650-79e2-11ee-9fa1-09d380781a0d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.236 + 100.64.9.236 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698972459 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96b66650-79e2-11ee-9fa1-09d380781a0d + + + diff --git a/graph/incidents_graphml/9/96c0f130-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96c0f130-1617-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f0d2ff485ca9097bce7883f55a4efb40bee8aae --- /dev/null +++ b/graph/incidents_graphml/9/96c0f130-1617-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.152 + 100.64.11.152 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96c0f130-1617-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/9/96c42320-3a82-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/96c42320-3a82-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8fa87e19acaae31a5ec6096d8b7b058de1e06ab5 --- /dev/null +++ b/graph/incidents_graphml/9/96c42320-3a82-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.224 + 100.64.32.224 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","Okta","Azure Security","ProofPoint Protect"] + + + HOST + 100.64.68.87 + 100.64.68.87 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692004304 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96c42320-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004304 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96c42320-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004304 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96c42320-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004304 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96c42320-3a82-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/9/96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml b/graph/incidents_graphml/9/96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..af6c1d648a54e88479ef0ee2ca5b30f73308a2d9 --- /dev/null +++ b/graph/incidents_graphml/9/96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.21 + 100.64.71.21 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.28.219 + 100.64.28.219 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.166 + 100.64.80.166 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688490162 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490162 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490162 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4 + + + INCIDENT_LINK + 1688490162 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96c8cdf0-1a8c-11ee-a9ef-735ae64b5bd4 + + + diff --git a/graph/incidents_graphml/9/96d23ac0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/96d23ac0-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..da94d89242ced79d82e894e69d83bf092fea8320 --- /dev/null +++ b/graph/incidents_graphml/9/96d23ac0-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348428 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96d23ac0-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/96dfce00-e2e2-11ee-b0e0-350848617e5b.graphml b/graph/incidents_graphml/9/96dfce00-e2e2-11ee-b0e0-350848617e5b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1dd45167bb3cda97f9fb24c21c0e147d7f9bdf98 --- /dev/null +++ b/graph/incidents_graphml/9/96dfce00-e2e2-11ee-b0e0-350848617e5b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.48 + 100.64.30.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710517331 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 96dfce00-e2e2-11ee-b0e0-350848617e5b + + + diff --git a/graph/incidents_graphml/9/96e21830-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/96e21830-14d6-11ed-9c5d-cfc137bdc6da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72a4c3a9401ab93bfc06d992e89a8d828bf7f9a6 --- /dev/null +++ b/graph/incidents_graphml/9/96e21830-14d6-11ed-9c5d-cfc137bdc6da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.176 + 100.64.71.176 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659714740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e21830-14d6-11ed-9c5d-cfc137bdc6da + + + diff --git a/graph/incidents_graphml/9/96e67a20-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/9/96e67a20-70e6-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20e2120b980143626c05d6ac4d1cf7244a8137ee --- /dev/null +++ b/graph/incidents_graphml/9/96e67a20-70e6-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.79 + 100.64.68.79 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1697984617 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e67a20-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984617 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e67a20-70e6-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/9/96e9a8d0-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/96e9a8d0-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9733bf106593a166ba0e3311e4f788792356ba1f --- /dev/null +++ b/graph/incidents_graphml/9/96e9a8d0-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.187 + 100.64.52.187 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971004 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96e9a8d0-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/96e9b100-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/9/96e9b100-2c8a-11ed-be76-c750f0345c87.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9c63ca41275f3f68e537870503c5d0ba891126bb --- /dev/null +++ b/graph/incidents_graphml/9/96e9b100-2c8a-11ed-be76-c750f0345c87.graphml @@ -0,0 +1,207 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.88134765625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.137 + 100.64.74.137 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.220 + 100.64.72.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.74 + 100.64.75.74 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.180 + 100.64.71.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.26.179 + USER-0015-1712.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320926 + malicious + 0.88134765625 + 0.88134765625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96e9b100-2c8a-11ed-be76-c750f0345c87 + + + diff --git a/graph/incidents_graphml/9/96e9d5f0-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/96e9d5f0-1617-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b59aeeb7a02026a7a1388a6a2db288a925a0c046 --- /dev/null +++ b/graph/incidents_graphml/9/96e9d5f0-1617-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.116 + 100.64.41.116 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000106 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96e9d5f0-1617-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/9/96f11ef0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/96f11ef0-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f31990205a77f594f7d0cb158caf131fd622a052 --- /dev/null +++ b/graph/incidents_graphml/9/96f11ef0-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.194 + 100.64.38.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389528 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96f11ef0-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/96f2f8d0-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/96f2f8d0-824a-11ed-9cff-b1e619d412bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9d3afd1200f5e8b703d96481478c98367a4838f0 --- /dev/null +++ b/graph/incidents_graphml/9/96f2f8d0-824a-11ed-9cff-b1e619d412bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.52 + 100.64.52.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 100.64.84.158 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1671749239 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96f2f8d0-824a-11ed-9cff-b1e619d412bc + + + diff --git a/graph/incidents_graphml/9/96f5a710-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/96f5a710-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6cdcd0917abfce5a64b174f5ca20a72bee3c04c5 --- /dev/null +++ b/graph/incidents_graphml/9/96f5a710-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.8 + 100.64.30.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 96f5a710-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/96f7b290-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/96f7b290-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4ab5e2c138f1ca4147a9a86d2330a0d75213b02 --- /dev/null +++ b/graph/incidents_graphml/9/96f7b290-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.189 + 100.64.52.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 96f7b290-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/96f89e20-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/96f89e20-824a-11ed-9cff-b1e619d412bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..dfed49b77057a17386c6a65f6d723d196b420e63 --- /dev/null +++ b/graph/incidents_graphml/9/96f89e20-824a-11ed-9cff-b1e619d412bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + 100.64.84.158 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.52.52 + 100.64.52.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1671749239 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 96f89e20-824a-11ed-9cff-b1e619d412bc + + + diff --git a/graph/incidents_graphml/9/9705bc50-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/9705bc50-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b82d03bfc4df76d02b19e13d65c4bc89d65ef467 --- /dev/null +++ b/graph/incidents_graphml/9/9705bc50-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.189 + 100.64.52.189 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9705bc50-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/9707a870-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/9707a870-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08d9e7e4a62a6e83e44aeea325e01483bfa31e78 --- /dev/null +++ b/graph/incidents_graphml/9/9707a870-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.8 + 100.64.30.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9707a870-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/970d8790-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/970d8790-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4dd439320ad367d6c9db2c3f16273d0f078df7b5 --- /dev/null +++ b/graph/incidents_graphml/9/970d8790-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.187 + 100.64.45.187 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 970d8790-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/97109fe0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/9/97109fe0-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1403bd342e228477f04c090c58bb7d3233f18570 --- /dev/null +++ b/graph/incidents_graphml/9/97109fe0-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.238 + 100.64.12.238 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025613 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97109fe0-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/9/97140480-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97140480-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a19eca50815d76f9e1c96fdef8b7d10eeb97769 --- /dev/null +++ b/graph/incidents_graphml/9/97140480-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.10 + 100.64.30.10 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97140480-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/971e5070-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/971e5070-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c019f90d65c679db1dd7c3bdc0104ca6643b016b --- /dev/null +++ b/graph/incidents_graphml/9/971e5070-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.187 + 100.64.45.187 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 971e5070-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/971f9770-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/971f9770-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..956045f0c4988fa8b3fd3b71a04cfb945a61c9a3 --- /dev/null +++ b/graph/incidents_graphml/9/971f9770-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.41.204 + 100.64.41.204 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348429 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 971f9770-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/9720d5c0-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/9720d5c0-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7336a60a9b3765fad1d215157c327584f62a942c --- /dev/null +++ b/graph/incidents_graphml/9/9720d5c0-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.10 + 100.64.30.10 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115350 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9720d5c0-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/9723e040-1804-11ed-8708-35bec77a7d27.graphml b/graph/incidents_graphml/9/9723e040-1804-11ed-8708-35bec77a7d27.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d87ea915f57a6e38d69be7daa792cc92ce8831f --- /dev/null +++ b/graph/incidents_graphml/9/9723e040-1804-11ed-8708-35bec77a7d27.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.101 + 100.64.69.101 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.220 + 100.64.73.220 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.221 + 100.64.73.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.222 + 100.64.73.222 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.181 + 100.64.71.181 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.223 + 100.64.73.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.224 + 100.64.73.224 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.18.2 + 100.64.18.2 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + INCIDENT_LINK + 1660064351 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9723e040-1804-11ed-8708-35bec77a7d27 + + + diff --git a/graph/incidents_graphml/9/97249440-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/97249440-ffe3-11ee-b8be-512e5047d566.graphml new file mode 100644 index 0000000000000000000000000000000000000000..31da20f1cd87acc2d4f55686dca8d9985b8f9c00 --- /dev/null +++ b/graph/incidents_graphml/9/97249440-ffe3-11ee-b8be-512e5047d566.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.60 + 100.64.26.60 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713706345 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97249440-ffe3-11ee-b8be-512e5047d566 + + + diff --git a/graph/incidents_graphml/9/9728adc0-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/9728adc0-7c1f-11ee-8eb9-57773318f728.graphml new file mode 100644 index 0000000000000000000000000000000000000000..99013dba28066e83fb4e80240819fecec025a0ed --- /dev/null +++ b/graph/incidents_graphml/9/9728adc0-7c1f-11ee-8eb9-57773318f728.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.217 + 100.64.24.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699218561 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9728adc0-7c1f-11ee-8eb9-57773318f728 + + + diff --git a/graph/incidents_graphml/9/972cd740-0da4-11ee-89a8-99e55fee7bce.graphml b/graph/incidents_graphml/9/972cd740-0da4-11ee-89a8-99e55fee7bce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..344cc829af114e9c81ba0a0c4ae59014dd5509ef --- /dev/null +++ b/graph/incidents_graphml/9/972cd740-0da4-11ee-89a8-99e55fee7bce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.205 + 100.64.35.205 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687071105 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 972cd740-0da4-11ee-89a8-99e55fee7bce + + + diff --git a/graph/incidents_graphml/9/972ce3b0-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/972ce3b0-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a62fa5b6056a0a7f1d4f670758bccd806ad7ecbd --- /dev/null +++ b/graph/incidents_graphml/9/972ce3b0-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.51 + 100.64.19.51 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115350 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 972ce3b0-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/972d1d80-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/972d1d80-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a538ce5897282db7c2ee2ceabaa802b72195eb24 --- /dev/null +++ b/graph/incidents_graphml/9/972d1d80-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 972d1d80-77e0-11ee-9673-bb6a5cba9414 + + + INCIDENT_LINK + 1698751698 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 972d1d80-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/97305ce0-2883-11ee-92b9-d3cce1c86342.graphml b/graph/incidents_graphml/9/97305ce0-2883-11ee-92b9-d3cce1c86342.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c8d93b2f99dbec9aaae126a9f81781a6fcfb530 --- /dev/null +++ b/graph/incidents_graphml/9/97305ce0-2883-11ee-92b9-d3cce1c86342.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.238 + 100.64.12.238 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690025613 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97305ce0-2883-11ee-92b9-d3cce1c86342 + + + diff --git a/graph/incidents_graphml/9/97366940-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/97366940-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..894aba31d37d3dade3c76701d54bc66705c499f4 --- /dev/null +++ b/graph/incidents_graphml/9/97366940-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.116 + 100.64.24.116 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971005 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97366940-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/97388c40-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/97388c40-7c1f-11ee-8eb9-57773318f728.graphml new file mode 100644 index 0000000000000000000000000000000000000000..46f95ee065c3547c29fc3f9753e03ea37bc53a23 --- /dev/null +++ b/graph/incidents_graphml/9/97388c40-7c1f-11ee-8eb9-57773318f728.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.217 + 100.64.24.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699218561 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97388c40-7c1f-11ee-8eb9-57773318f728 + + + diff --git a/graph/incidents_graphml/9/9738b880-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/9738b880-ffe3-11ee-b8be-512e5047d566.graphml new file mode 100644 index 0000000000000000000000000000000000000000..52487d64488dd083be212c1e7e41e160b3b4ea88 --- /dev/null +++ b/graph/incidents_graphml/9/9738b880-ffe3-11ee-b8be-512e5047d566.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.60 + 100.64.26.60 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713706345 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9738b880-ffe3-11ee-b8be-512e5047d566 + + + diff --git a/graph/incidents_graphml/9/973bb0c0-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/973bb0c0-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43d2a51e402dcc8fea964dbe718a1a9e67df0de6 --- /dev/null +++ b/graph/incidents_graphml/9/973bb0c0-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.51 + 100.64.19.51 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 973bb0c0-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/973bc680-1617-11ee-87fd-95133fbba576.graphml b/graph/incidents_graphml/9/973bc680-1617-11ee-87fd-95133fbba576.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d77b8bf54df2013838aa8e7625e902eba0532891 --- /dev/null +++ b/graph/incidents_graphml/9/973bc680-1617-11ee-87fd-95133fbba576.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.128 + 100.64.28.128 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688000107 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 973bc680-1617-11ee-87fd-95133fbba576 + + + diff --git a/graph/incidents_graphml/9/973e5b90-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/973e5b90-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb58d642da0fed6ff4d87646d1721a1c7d71a139 --- /dev/null +++ b/graph/incidents_graphml/9/973e5b90-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.22 + 100.64.21.22 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751698 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 973e5b90-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/974143a0-216e-11ee-9e0b-8dcc0a578b7b.graphml b/graph/incidents_graphml/9/974143a0-216e-11ee-9e0b-8dcc0a578b7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f5d228792fcaece9eed2fab0a07360809fba7882 --- /dev/null +++ b/graph/incidents_graphml/9/974143a0-216e-11ee-9e0b-8dcc0a578b7b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.99 + 100.64.11.99 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689246936 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 974143a0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246936 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 974143a0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246936 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 974143a0-216e-11ee-9e0b-8dcc0a578b7b + + + INCIDENT_LINK + 1689246936 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 974143a0-216e-11ee-9e0b-8dcc0a578b7b + + + diff --git a/graph/incidents_graphml/9/9742afd0-1942-11ee-b83b-5979e1f254c2.graphml b/graph/incidents_graphml/9/9742afd0-1942-11ee-b83b-5979e1f254c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea096d2084e19f6f8acafbe52b6904df1cdc135b --- /dev/null +++ b/graph/incidents_graphml/9/9742afd0-1942-11ee-b83b-5979e1f254c2.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.73 + 100.64.49.73 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688348429 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9742afd0-1942-11ee-b83b-5979e1f254c2 + + + diff --git a/graph/incidents_graphml/9/97474980-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97474980-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ecdd330136acc28937453104228aede9705b2dcc --- /dev/null +++ b/graph/incidents_graphml/9/97474980-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.74 + 100.64.10.74 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115351 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97474980-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/974a6470-93b6-11ee-ad07-e3190f846a2a.graphml b/graph/incidents_graphml/9/974a6470-93b6-11ee-ad07-e3190f846a2a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe13f7b508b28d8810f1887cad02a390f1aa31dd --- /dev/null +++ b/graph/incidents_graphml/9/974a6470-93b6-11ee-ad07-e3190f846a2a.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.79 + 100.64.69.79 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1701812292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 974a6470-93b6-11ee-ad07-e3190f846a2a + + + INCIDENT_LINK + 1701812292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 974a6470-93b6-11ee-ad07-e3190f846a2a + + + diff --git a/graph/incidents_graphml/9/974a92d0-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/974a92d0-ffe3-11ee-b8be-512e5047d566.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fe101398591c0eab6318123f2fbf37042066675b --- /dev/null +++ b/graph/incidents_graphml/9/974a92d0-ffe3-11ee-b8be-512e5047d566.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.32 + 100.64.22.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713706345 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 974a92d0-ffe3-11ee-b8be-512e5047d566 + + + diff --git a/graph/incidents_graphml/9/974d73d0-7c1f-11ee-8eb9-57773318f728.graphml b/graph/incidents_graphml/9/974d73d0-7c1f-11ee-8eb9-57773318f728.graphml new file mode 100644 index 0000000000000000000000000000000000000000..22b397661d0c4f9441de5da484ca55795db5173b --- /dev/null +++ b/graph/incidents_graphml/9/974d73d0-7c1f-11ee-8eb9-57773318f728.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.162 + 100.64.3.162 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1699218562 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 974d73d0-7c1f-11ee-8eb9-57773318f728 + + + diff --git a/graph/incidents_graphml/9/974e0ff0-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/974e0ff0-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4ba20189ac83351628ffd139d669d678c19338a1 --- /dev/null +++ b/graph/incidents_graphml/9/974e0ff0-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.116 + 100.64.24.116 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971005 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 974e0ff0-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/97505cf0-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/97505cf0-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e1ae57901314060e5ec135cdf076a6b977849d2e --- /dev/null +++ b/graph/incidents_graphml/9/97505cf0-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.38 + 100.64.21.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 97505cf0-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/975067a0-5161-11ed-8537-055dd7dfd795.graphml b/graph/incidents_graphml/9/975067a0-5161-11ed-8537-055dd7dfd795.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f3e8d53f152c87b5ab2a67d838a666c907bebae4 --- /dev/null +++ b/graph/incidents_graphml/9/975067a0-5161-11ed-8537-055dd7dfd795.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.116 + 100.64.30.116 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.240 + 100.64.1.240 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.72.129 + 100.64.72.129 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666371511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 975067a0-5161-11ed-8537-055dd7dfd795 + + + INCIDENT_LINK + 1666371511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 975067a0-5161-11ed-8537-055dd7dfd795 + + + INCIDENT_LINK + 1666371511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 975067a0-5161-11ed-8537-055dd7dfd795 + + + INCIDENT_LINK + 1666371511 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 975067a0-5161-11ed-8537-055dd7dfd795 + + + diff --git a/graph/incidents_graphml/9/97557a50-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97557a50-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..154f9691cddd5404e05395970233ad4b421f1f34 --- /dev/null +++ b/graph/incidents_graphml/9/97557a50-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.74 + 100.64.10.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115351 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97557a50-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/9761c210-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/9761c210-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..20020b5d074e46cacb304989fa5eb7afe16de57d --- /dev/null +++ b/graph/incidents_graphml/9/9761c210-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.147 + 100.64.23.147 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9761c210-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/977104d0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/977104d0-965f-11ee-897e-618c2c7bcb08.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2171042dff8741273cff4a11fc8fd926cf362bf --- /dev/null +++ b/graph/incidents_graphml/9/977104d0-965f-11ee-897e-618c2c7bcb08.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.25.106 + 100.64.25.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702104780 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977104d0-965f-11ee-897e-618c2c7bcb08 + + + diff --git a/graph/incidents_graphml/9/97723cd0-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/97723cd0-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fdb0cbe8cf95bc77a0d0adbeb4e9840270e41a0 --- /dev/null +++ b/graph/incidents_graphml/9/97723cd0-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.189 + 100.64.45.189 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97723cd0-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/977458b0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/977458b0-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2ce05d341934f699d5ec9dad2158b6aae0667f12 --- /dev/null +++ b/graph/incidents_graphml/9/977458b0-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.196 + USER-0015-1320.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389529 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 977458b0-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/9776c210-2fea-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/9/9776c210-2fea-11ef-bbc8-b57a691da072.graphml new file mode 100644 index 0000000000000000000000000000000000000000..452cf07de244a2ea6179346e4d3d3ac51389bcfa --- /dev/null +++ b/graph/incidents_graphml/9/9776c210-2fea-11ef-bbc8-b57a691da072.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.92.23 + USER-0015-2082.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718987008 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9776c210-2fea-11ef-bbc8-b57a691da072 + + + diff --git a/graph/incidents_graphml/9/977cf460-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/977cf460-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3b756bc5807829cc2806b165f87a079e0899083c --- /dev/null +++ b/graph/incidents_graphml/9/977cf460-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,157 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.39 + 100.64.73.39 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.63 + 100.64.72.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.69 + 100.64.72.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977cf460-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977cf460-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977cf460-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977cf460-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977cf460-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977cf460-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/977e7a20-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/977e7a20-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bea313cb3244d8e39ee4d095cc80adbee0f9e61f --- /dev/null +++ b/graph/incidents_graphml/9/977e7a20-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292996 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977e7a20-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/977f6560-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/977f6560-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..91b2af0259b66c0af27f6dc7e244a11f358908a7 --- /dev/null +++ b/graph/incidents_graphml/9/977f6560-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,553 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.41 + 100.64.73.41 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.159 + 100.64.1.159 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.13.1 + 100.64.13.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.14.39 + 100.64.14.39 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.42 + 100.64.73.42 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.224 + 100.64.71.224 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.43 + 100.64.73.43 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.44 + 100.64.73.44 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.45 + 100.64.73.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.46 + 100.64.73.46 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.79 + 100.64.72.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.47 + 100.64.73.47 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.51.48 + 100.64.51.48 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.48 + 100.64.73.48 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.21 + 100.64.73.21 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144106 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 977f6560-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/977faad0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/977faad0-965f-11ee-897e-618c2c7bcb08.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ffab2577fbdb6a8903c643e935f5c4fd9dfcc23 --- /dev/null +++ b/graph/incidents_graphml/9/977faad0-965f-11ee-897e-618c2c7bcb08.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.106 + 100.64.25.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702104780 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 977faad0-965f-11ee-897e-618c2c7bcb08 + + + diff --git a/graph/incidents_graphml/9/97863a00-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/97863a00-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3e550e5d6401e4ef8f49e8a398334f75cc292e2 --- /dev/null +++ b/graph/incidents_graphml/9/97863a00-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.189 + 100.64.45.189 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751699 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97863a00-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/9786cc40-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/9786cc40-2816-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1639ed893c368c824e0c0eb4ff3925528943fe6e --- /dev/null +++ b/graph/incidents_graphml/9/9786cc40-2816-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.37 + 100.64.34.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718126296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9786cc40-2816-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/9/978dbc60-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/978dbc60-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c48fc9217e7984646a1e779c948fdca08785c1f --- /dev/null +++ b/graph/incidents_graphml/9/978dbc60-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.32.100 + 100.64.32.100 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 978dbc60-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/978ebe80-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/978ebe80-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fc31bb3278a26e1798fe1bf237e4ff9c64afb133 --- /dev/null +++ b/graph/incidents_graphml/9/978ebe80-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.196 + USER-0015-1320.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389529 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 978ebe80-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/97915a80-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/97915a80-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7b0e7b89149aa66ee7b03c02178b4594a60cd97 --- /dev/null +++ b/graph/incidents_graphml/9/97915a80-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.177 + 100.64.11.177 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971006 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97915a80-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/97917de0-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/97917de0-5560-11ee-8e2f-e12aa4f0d6f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28c07cf2f842016dd0548c02f3a82acb7bbfa52e --- /dev/null +++ b/graph/incidents_graphml/9/97917de0-5560-11ee-8e2f-e12aa4f0d6f4.graphml @@ -0,0 +1,545 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.71 + 100.64.45.71 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.72 + 100.64.45.72 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.73 + 100.64.45.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.74 + 100.64.45.74 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.75 + 100.64.45.75 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.93 + 100.64.25.93 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.104 + USER-0015-1322.example.internal + ["Exploiting Host","Exploiting Target"] + 0.94375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.76 + 100.64.45.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.77 + 100.64.45.77 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.169 + 100.64.22.169 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.183 + 100.64.7.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.78 + 100.64.45.78 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.79 + 100.64.45.79 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958384 + malicious + 0.94375 + 0.94375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97917de0-5560-11ee-8e2f-e12aa4f0d6f4 + + + diff --git a/graph/incidents_graphml/9/979666a0-77e0-11ee-9673-bb6a5cba9414.graphml b/graph/incidents_graphml/9/979666a0-77e0-11ee-9673-bb6a5cba9414.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bdafac1d5fa965e0babb822f30dc1d153b6263d --- /dev/null +++ b/graph/incidents_graphml/9/979666a0-77e0-11ee-9673-bb6a5cba9414.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.44.73 + 100.64.44.73 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698751699 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 979666a0-77e0-11ee-9673-bb6a5cba9414 + + + diff --git a/graph/incidents_graphml/9/979e1010-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/979e1010-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13ace0f75e0e87e6db3f10793e07ae8fe154f8ae --- /dev/null +++ b/graph/incidents_graphml/9/979e1010-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.114 + 100.64.33.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292997 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 979e1010-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/979f8b50-67ae-11ee-bbb0-b746705ccafc.graphml b/graph/incidents_graphml/9/979f8b50-67ae-11ee-bbb0-b746705ccafc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b04cebbd929d907614d3360bba9cf0c2326cfd06 --- /dev/null +++ b/graph/incidents_graphml/9/979f8b50-67ae-11ee-bbb0-b746705ccafc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.191 + 100.64.52.191 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696971006 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 979f8b50-67ae-11ee-bbb0-b746705ccafc + + + diff --git a/graph/incidents_graphml/9/979fab70-2816-11ef-acb4-432fc0d170c1.graphml b/graph/incidents_graphml/9/979fab70-2816-11ef-acb4-432fc0d170c1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf3d8b8050fed19134d3cad2cddf70633fc21738 --- /dev/null +++ b/graph/incidents_graphml/9/979fab70-2816-11ef-acb4-432fc0d170c1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.37 + 100.64.34.37 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718126297 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 979fab70-2816-11ef-acb4-432fc0d170c1 + + + diff --git a/graph/incidents_graphml/9/97a04fe0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/97a04fe0-224f-11ed-be68-fd583a4df292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fcba4834a3dc4fcc425d83d0f3fe7ee09ea6200f --- /dev/null +++ b/graph/incidents_graphml/9/97a04fe0-224f-11ed-be68-fd583a4df292.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.86 + 100.64.85.86 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661196076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97a04fe0-224f-11ed-be68-fd583a4df292 + + + diff --git a/graph/incidents_graphml/9/97b25140-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/97b25140-224f-11ed-be68-fd583a4df292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3d648e946e95aa530df905175202efc0c1e3d80 --- /dev/null +++ b/graph/incidents_graphml/9/97b25140-224f-11ed-be68-fd583a4df292.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.86 + 100.64.85.86 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1661196076 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97b25140-224f-11ed-be68-fd583a4df292 + + + diff --git a/graph/incidents_graphml/9/97b844b0-224f-11ed-be68-fd583a4df292.graphml b/graph/incidents_graphml/9/97b844b0-224f-11ed-be68-fd583a4df292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f220bfd4e27fdc4dbda1a5b7c6b15a563c37b397 --- /dev/null +++ b/graph/incidents_graphml/9/97b844b0-224f-11ed-be68-fd583a4df292.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.90 + 100.64.85.90 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1661196076 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97b844b0-224f-11ed-be68-fd583a4df292 + + + diff --git a/graph/incidents_graphml/9/97bacff0-2fea-11ef-bbc8-b57a691da072.graphml b/graph/incidents_graphml/9/97bacff0-2fea-11ef-bbc8-b57a691da072.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f98d54fdb11926b928192038459eaa9d40012b8 --- /dev/null +++ b/graph/incidents_graphml/9/97bacff0-2fea-11ef-bbc8-b57a691da072.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.92.25 + 100.64.92.25 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718987008 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97bacff0-2fea-11ef-bbc8-b57a691da072 + + + diff --git a/graph/incidents_graphml/9/97c852b0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97c852b0-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e0f0dcc72f1513c81b70da4b7395573e7fb86824 --- /dev/null +++ b/graph/incidents_graphml/9/97c852b0-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.96 + 100.64.71.96 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97c852b0-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97cd5bc0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97cd5bc0-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..79497a80acd05263bf30d818dbad4bee35210ca6 --- /dev/null +++ b/graph/incidents_graphml/9/97cd5bc0-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.96 + 100.64.71.96 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97cd5bc0-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97d12b00-a932-11ed-a973-7df772fdd65e.graphml b/graph/incidents_graphml/9/97d12b00-a932-11ed-a973-7df772fdd65e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..454c7a1f038f0a52d9a926b7b38f9abd602e60b0 --- /dev/null +++ b/graph/incidents_graphml/9/97d12b00-a932-11ed-a973-7df772fdd65e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.54 + 100.64.84.54 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1676027027 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97d12b00-a932-11ed-a973-7df772fdd65e + + + diff --git a/graph/incidents_graphml/9/97dace90-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/97dace90-33c4-11ee-ae17-5996ccab4a65.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e98ea1d6ce01a4555c15726fe04a384f0f3d970 --- /dev/null +++ b/graph/incidents_graphml/9/97dace90-33c4-11ee-ae17-5996ccab4a65.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.23 + 100.64.15.23 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691262995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97dace90-33c4-11ee-ae17-5996ccab4a65 + + + diff --git a/graph/incidents_graphml/9/97db6450-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/9/97db6450-09ab-11ef-a326-59a1bcca7fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8ecc599765d2c222f2ef01f4f731f743ff1d89ea --- /dev/null +++ b/graph/incidents_graphml/9/97db6450-09ab-11ef-a326-59a1bcca7fdf.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.44 + 100.64.49.44 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.46 + 100.64.10.46 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1714781806 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97db6450-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781806 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97db6450-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781806 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97db6450-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781806 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97db6450-09ab-11ef-a326-59a1bcca7fdf + + + diff --git a/graph/incidents_graphml/9/97de0b40-8447-11ee-823e-1956338371c0.graphml b/graph/incidents_graphml/9/97de0b40-8447-11ee-823e-1956338371c0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81d28681e6cbe703c66f3aaf4414cda65f6bf009 --- /dev/null +++ b/graph/incidents_graphml/9/97de0b40-8447-11ee-823e-1956338371c0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.243 + 100.64.24.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700115352 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97de0b40-8447-11ee-823e-1956338371c0 + + + diff --git a/graph/incidents_graphml/9/97e2fd50-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/97e2fd50-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cc7083cc7051e0d246bc4887504b8ee36a6726a --- /dev/null +++ b/graph/incidents_graphml/9/97e2fd50-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.3.208 + 100.64.3.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224014 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97e2fd50-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/97e577a0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97e577a0-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3d643f622cf44e9eae749d60378282f90f797152 --- /dev/null +++ b/graph/incidents_graphml/9/97e577a0-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.76 + 100.64.71.76 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97e577a0-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97eaf5e0-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97eaf5e0-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..764b3ed0c484c1a6aa1bcc3a354026c0b4e88891 --- /dev/null +++ b/graph/incidents_graphml/9/97eaf5e0-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.76 + 100.64.71.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97eaf5e0-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97ee2a30-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97ee2a30-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..13af229de2137ec624d90829f64d1c46ef37a883 --- /dev/null +++ b/graph/incidents_graphml/9/97ee2a30-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.191 + USER-0015-1919.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97ee2a30-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97f13cc0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/97f13cc0-33c4-11ee-ae17-5996ccab4a65.graphml new file mode 100644 index 0000000000000000000000000000000000000000..38b843c80ce0081d4dfab31e659ee26df6fc59d6 --- /dev/null +++ b/graph/incidents_graphml/9/97f13cc0-33c4-11ee-ae17-5996ccab4a65.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.24 + 100.64.15.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691262995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97f13cc0-33c4-11ee-ae17-5996ccab4a65 + + + diff --git a/graph/incidents_graphml/9/97f37810-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/97f37810-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..624d951e5378d82be2aba517c8275440f4b197f0 --- /dev/null +++ b/graph/incidents_graphml/9/97f37810-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.3.208 + 100.64.3.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224014 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 97f37810-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/97f38160-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97f38160-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..78c12a1d9e8eba383b32c53d98490fbdf46c2b4f --- /dev/null +++ b/graph/incidents_graphml/9/97f38160-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.191 + USER-0015-1919.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97f38160-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97f583a0-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/97f583a0-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a73602cd86ae90ee69b4519c86b3e8088f82eec5 --- /dev/null +++ b/graph/incidents_graphml/9/97f583a0-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.114.157.160 + 10.114.157.160 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057522 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97f583a0-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057522 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 97f583a0-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/97f5b390-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/9/97f5b390-928d-11ee-92fb-e74bdedb3c0b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33219172c4016ea970bb493fd85f27442fc8356f --- /dev/null +++ b/graph/incidents_graphml/9/97f5b390-928d-11ee-92fb-e74bdedb3c0b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.217 + 100.64.45.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1701684733 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97f5b390-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684733 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97f5b390-928d-11ee-92fb-e74bdedb3c0b + + + diff --git a/graph/incidents_graphml/9/97f77900-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97f77900-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b10b96507573150fdcbd9cd4816f6bd20c692b81 --- /dev/null +++ b/graph/incidents_graphml/9/97f77900-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.74.160 + 100.64.74.160 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97f77900-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97fca920-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97fca920-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..381aea0925b929de54784bba935e7b17597053f2 --- /dev/null +++ b/graph/incidents_graphml/9/97fca920-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.74.160 + 100.64.74.160 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 97fca920-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/97ffb660-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/97ffb660-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5b3688a0d00a0afce2beaf4ad2f4391431a3f2bb --- /dev/null +++ b/graph/incidents_graphml/9/97ffb660-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.244 + 100.64.70.244 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 97ffb660-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/9804e680-28d0-11ed-8866-05560d02e218.graphml b/graph/incidents_graphml/9/9804e680-28d0-11ed-8866-05560d02e218.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b16200a708567caf460b9af1b333d77b8ff8125e --- /dev/null +++ b/graph/incidents_graphml/9/9804e680-28d0-11ed-8866-05560d02e218.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.244 + 100.64.70.244 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661911188 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9804e680-28d0-11ed-8866-05560d02e218 + + + diff --git a/graph/incidents_graphml/9/980aa870-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/980aa870-2a11-11ee-ab73-f1f4f0adc079.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6340c602d9827ab08292d8c14a22822991141bf --- /dev/null +++ b/graph/incidents_graphml/9/980aa870-2a11-11ee-ab73-f1f4f0adc079.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.6 + 100.64.23.6 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.116 + 100.64.72.116 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690196554 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 980aa870-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196554 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 980aa870-2a11-11ee-ab73-f1f4f0adc079 + + + diff --git a/graph/incidents_graphml/9/9811e5a0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/9811e5a0-14d6-11ed-9c5d-cfc137bdc6da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2c3c3dcc82f290c16f81af21846fc070db6bbd9f --- /dev/null +++ b/graph/incidents_graphml/9/9811e5a0-14d6-11ed-9c5d-cfc137bdc6da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.96 + 100.64.76.96 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659714742 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9811e5a0-14d6-11ed-9c5d-cfc137bdc6da + + + diff --git a/graph/incidents_graphml/9/982210c0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/982210c0-33c4-11ee-ae17-5996ccab4a65.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c4c8f296958eef83223b099d9f47b122ccd3c324 --- /dev/null +++ b/graph/incidents_graphml/9/982210c0-33c4-11ee-ae17-5996ccab4a65.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.24 + 100.64.15.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691262995 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 982210c0-33c4-11ee-ae17-5996ccab4a65 + + + diff --git a/graph/incidents_graphml/9/9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c55fe12cfe6f1243c680dda8de489b4c4303bfbd --- /dev/null +++ b/graph/incidents_graphml/9/9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4.graphml @@ -0,0 +1,539 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.25 + 100.64.12.25 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.89 + 100.64.45.89 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.90 + 100.64.45.90 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.91 + 100.64.45.91 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.206 + 100.64.34.206 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.176 + 100.64.31.176 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.29 + 100.64.8.29 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.215 + 100.64.18.215 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.180 + 100.64.35.180 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.92 + 100.64.45.92 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.93 + 100.64.45.93 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.94 + 100.64.45.94 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.95 + 100.64.45.95 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.190 + 100.64.20.190 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9828b4d0-5560-11ee-8e2f-e12aa4f0d6f4 + + + diff --git a/graph/incidents_graphml/9/982d1da0-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/982d1da0-0ebf-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f019700ee32314f029fc204a65bf480bdf1a95a4 --- /dev/null +++ b/graph/incidents_graphml/9/982d1da0-0ebf-11ee-9392-932bfd273540.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.191 + 100.64.72.191 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.58.79 + 100.64.58.79 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687192655 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 982d1da0-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192655 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 982d1da0-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192655 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 982d1da0-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192655 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 982d1da0-0ebf-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/9/98317670-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/98317670-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..008dd68f25fecaa010a13623832c6a7fafc7b704 --- /dev/null +++ b/graph/incidents_graphml/9/98317670-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.253 + 100.64.10.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98317670-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698292998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98317670-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/984067f0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/984067f0-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..378fd1d73a227b02f3bce773a309bfc2ed850d64 --- /dev/null +++ b/graph/incidents_graphml/9/984067f0-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.90 + 100.64.72.90 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.91 + 100.64.72.91 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.92 + 100.64.72.92 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.93 + 100.64.72.93 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.58.162 + 100.64.58.162 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.48.229 + 100.64.48.229 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.233 + 100.64.71.233 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.59.165 + 100.64.59.165 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 984067f0-238e-11ee-8f53-17c8a7373bd3 + + + diff --git a/graph/incidents_graphml/9/98412de0-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/98412de0-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6508c331207348d457ca92f9364968405f4ef5db --- /dev/null +++ b/graph/incidents_graphml/9/98412de0-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.253 + 100.64.10.253 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 98412de0-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/984a59b0-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/9/984a59b0-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ac41497724b79a4f205d972dfdef59f0f7d2582 --- /dev/null +++ b/graph/incidents_graphml/9/984a59b0-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.119 + 100.64.85.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694431822 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 984a59b0-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/9/984b9730-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/984b9730-f340-11ec-a343-c72f25ca2eb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..39f0b7e3c7515e03fdb58191e30a0c56297cefdb --- /dev/null +++ b/graph/incidents_graphml/9/984b9730-f340-11ec-a343-c72f25ca2eb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.219 + 100.64.73.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.10.93 + 100.64.10.93 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656021930 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 984b9730-f340-11ec-a343-c72f25ca2eb2 + + + INCIDENT_LINK + 1656021930 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 984b9730-f340-11ec-a343-c72f25ca2eb2 + + + diff --git a/graph/incidents_graphml/9/984d9bf0-2957-11ed-833a-955cfd42297d.graphml b/graph/incidents_graphml/9/984d9bf0-2957-11ed-833a-955cfd42297d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08027c34c869bf312b19cb726038d6070c615923 --- /dev/null +++ b/graph/incidents_graphml/9/984d9bf0-2957-11ed-833a-955cfd42297d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.144 + 100.64.88.144 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + 10.74.211.215 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1661969171 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 984d9bf0-2957-11ed-833a-955cfd42297d + + + diff --git a/graph/incidents_graphml/9/9851f6c0-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9851f6c0-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f8274ccccd73bc81d783a438d131bc769ae8cb27 --- /dev/null +++ b/graph/incidents_graphml/9/9851f6c0-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.114 + 100.64.33.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292998 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9851f6c0-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/9858f900-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9858f900-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd4a2cddf55ebdf8341e88e194b9e0cc6e60715a --- /dev/null +++ b/graph/incidents_graphml/9/9858f900-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.210.77.251 + 10.210.77.251 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.94 + 100.64.72.94 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.95 + 100.64.72.95 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9858f900-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9858f900-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9858f900-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480584 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9858f900-238e-11ee-8f53-17c8a7373bd3 + + + diff --git a/graph/incidents_graphml/9/985f0400-05b4-11ee-9e30-fd3f69b84945.graphml b/graph/incidents_graphml/9/985f0400-05b4-11ee-9e30-fd3f69b84945.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47f3ce13050734be636722558ae93372b8d2ac79 --- /dev/null +++ b/graph/incidents_graphml/9/985f0400-05b4-11ee-9e30-fd3f69b84945.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.189 + 100.64.12.189 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.29 + 100.64.68.29 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.18 + 100.64.14.18 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.51.48 + 100.64.51.48 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1686198370 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 985f0400-05b4-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198370 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 985f0400-05b4-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198370 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 985f0400-05b4-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198370 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 985f0400-05b4-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198370 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 985f0400-05b4-11ee-9e30-fd3f69b84945 + + + INCIDENT_LINK + 1686198370 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 985f0400-05b4-11ee-9e30-fd3f69b84945 + + + diff --git a/graph/incidents_graphml/9/98666920-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/98666920-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b98a3a3b16e5bb8b22d27fdb9bcaa15c4d06635 --- /dev/null +++ b/graph/incidents_graphml/9/98666920-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.183 + 100.64.37.183 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698292998 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98666920-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/986bdf90-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/986bdf90-965f-11ee-897e-618c2c7bcb08.graphml new file mode 100644 index 0000000000000000000000000000000000000000..24bfa48111d9ca07c1e86d7af8bf44c1d379dbc1 --- /dev/null +++ b/graph/incidents_graphml/9/986bdf90-965f-11ee-897e-618c2c7bcb08.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.27 + 100.64.56.27 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702104781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 986bdf90-965f-11ee-897e-618c2c7bcb08 + + + diff --git a/graph/incidents_graphml/9/986d98b0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/986d98b0-33c4-11ee-ae17-5996ccab4a65.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b26f827ec4b31fb3297c8e919f4849099d7eda7a --- /dev/null +++ b/graph/incidents_graphml/9/986d98b0-33c4-11ee-ae17-5996ccab4a65.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.27 + 100.64.15.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691262996 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 986d98b0-33c4-11ee-ae17-5996ccab4a65 + + + diff --git a/graph/incidents_graphml/9/98752e80-3a82-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/98752e80-3a82-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aef628fe38251799230e0a1cd26144a2a2a7bb7e --- /dev/null +++ b/graph/incidents_graphml/9/98752e80-3a82-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,205 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.132 + 100.64.9.132 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.68.88 + 100.64.68.88 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.54.216 + 100.64.54.216 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004307 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host","Exploited Service"] + complete-mission + Disrupted + 98752e80-3a82-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/9/987ad3b0-965f-11ee-897e-618c2c7bcb08.graphml b/graph/incidents_graphml/9/987ad3b0-965f-11ee-897e-618c2c7bcb08.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18e620b92b8457f0ba635f3a3b9a579081e20e2c --- /dev/null +++ b/graph/incidents_graphml/9/987ad3b0-965f-11ee-897e-618c2c7bcb08.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.27 + 100.64.56.27 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702104782 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 987ad3b0-965f-11ee-897e-618c2c7bcb08 + + + diff --git a/graph/incidents_graphml/9/988907e0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/988907e0-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..312d185873e7851617d31c8a8cb6f23b52de73ed --- /dev/null +++ b/graph/incidents_graphml/9/988907e0-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.208 + 100.64.51.208 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090006 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 988907e0-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9892ad50-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/9/9892ad50-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e518010aa6f9d2512350abcc319e10466061f01c --- /dev/null +++ b/graph/incidents_graphml/9/9892ad50-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.85.123 + USER-0015-1971.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1694431823 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9892ad50-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/9/98a1ef90-5096-11ee-861e-f1beba7e8aa3.graphml b/graph/incidents_graphml/9/98a1ef90-5096-11ee-861e-f1beba7e8aa3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c829dd95bc00c035437e900c2a33ba2db18ad2df --- /dev/null +++ b/graph/incidents_graphml/9/98a1ef90-5096-11ee-861e-f1beba7e8aa3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.74.211.215 + HOST-17029 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.85.123 + USER-0015-1971.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694431823 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98a1ef90-5096-11ee-861e-f1beba7e8aa3 + + + diff --git a/graph/incidents_graphml/9/98a90f70-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/98a90f70-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..265cde3856a4f79a6d33ef5ab149b54d2866186f --- /dev/null +++ b/graph/incidents_graphml/9/98a90f70-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.242 + 100.64.52.242 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398682 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98a90f70-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/98aa67b0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/98aa67b0-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b10c0e215ec528b68069ec9dff0aeeea4fdba9f7 --- /dev/null +++ b/graph/incidents_graphml/9/98aa67b0-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.198 + 100.64.38.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389531 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 98aa67b0-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/98b12950-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/98b12950-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..438c89b553f342e1a12a70c7352e618fe7d67aa1 --- /dev/null +++ b/graph/incidents_graphml/9/98b12950-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.208 + 100.64.51.208 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090006 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98b12950-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/98b57840-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/98b57840-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fac56e3a2464f0496d6872f0f15d77989c7f1bc5 --- /dev/null +++ b/graph/incidents_graphml/9/98b57840-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.138.95.225 + 10.138.95.225 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057523 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 98b57840-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057523 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 98b57840-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/98b8ef30-ada1-11ed-a484-f73b989f2034.graphml b/graph/incidents_graphml/9/98b8ef30-ada1-11ed-a484-f73b989f2034.graphml new file mode 100644 index 0000000000000000000000000000000000000000..08aca5b23962b7805e11d7e112c7c07e6d46ca14 --- /dev/null +++ b/graph/incidents_graphml/9/98b8ef30-ada1-11ed-a484-f73b989f2034.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.50 + 100.64.72.50 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.51 + 100.64.72.51 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.53 + 100.64.72.53 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.54 + 100.64.72.54 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.55 + 100.64.72.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.56 + 100.64.72.56 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.57 + 100.64.72.57 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.72.58 + 100.64.72.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.71.143 + 100.64.71.143 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.1.159 + HOST-12822 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + INCIDENT_LINK + 1676514508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98b8ef30-ada1-11ed-a484-f73b989f2034 + + + diff --git a/graph/incidents_graphml/9/98cfdcf0-33c4-11ee-ae17-5996ccab4a65.graphml b/graph/incidents_graphml/9/98cfdcf0-33c4-11ee-ae17-5996ccab4a65.graphml new file mode 100644 index 0000000000000000000000000000000000000000..34d4443cbdbcc683e0c9b3894a2170caef425979 --- /dev/null +++ b/graph/incidents_graphml/9/98cfdcf0-33c4-11ee-ae17-5996ccab4a65.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.29 + 100.64.15.29 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1691262996 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98cfdcf0-33c4-11ee-ae17-5996ccab4a65 + + + diff --git a/graph/incidents_graphml/9/98d5e480-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/98d5e480-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a46da4232dd0a049e161b1f6f6078558ad87af2 --- /dev/null +++ b/graph/incidents_graphml/9/98d5e480-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.198 + 100.64.38.198 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389532 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98d5e480-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/98d7f830-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/98d7f830-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97967ce161faa8e551ed91263cc6be9c3456afbc --- /dev/null +++ b/graph/incidents_graphml/9/98d7f830-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766006 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 98d7f830-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/98dbebc0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/98dbebc0-2483-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..94fbe53b12c6d4afb16728687ea0e3cc5319898a --- /dev/null +++ b/graph/incidents_graphml/9/98dbebc0-2483-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,761 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.247 + 100.64.23.247 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.29 + 100.64.8.29 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.112 + 100.64.16.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.248 + 100.64.23.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.249 + 100.64.23.249 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.221 + 100.64.2.221 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.250 + USER-0015-1246.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.251 + 100.64.23.251 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.151 + 100.64.22.151 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.253 + 100.64.23.253 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.178 + 100.64.8.178 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.254 + 100.64.23.254 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.2 + 100.64.24.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.3 + 100.64.24.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98dbebc0-2483-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/9/98e7fbb0-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/98e7fbb0-ee05-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f2c43b92558571dee95fc1f1b5bc276661d31f5 --- /dev/null +++ b/graph/incidents_graphml/9/98e7fbb0-ee05-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.189 + 100.64.80.189 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.188 + USER-0015-1726.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655446834 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98e7fbb0-ee05-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655446834 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98e7fbb0-ee05-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/9/98ea43a0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/98ea43a0-2483-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6d38ed327ac7003a6fead90f06faff807afe982 --- /dev/null +++ b/graph/incidents_graphml/9/98ea43a0-2483-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,445 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.2.221 + 100.64.2.221 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.250 + USER-0015-1246.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.251 + 100.64.23.251 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.22.151 + 100.64.22.151 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.252 + 100.64.23.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.253 + 100.64.23.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.178 + 100.64.8.178 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.254 + 100.64.23.254 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.255 + 100.64.23.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733309 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ea43a0-2483-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/9/98eda100-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/98eda100-ee05-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce4519a214b31d5c58fcfe811e908c42986174cc --- /dev/null +++ b/graph/incidents_graphml/9/98eda100-ee05-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.93.85.41 + 10.93.85.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.80.190 + 100.64.80.190 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655446834 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98eda100-ee05-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655446834 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98eda100-ee05-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/9/98ee6b60-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/98ee6b60-898d-11ee-afb8-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b53e0f6f1bfa093f83472a8de1d1b26be4155135 --- /dev/null +++ b/graph/incidents_graphml/9/98ee6b60-898d-11ee-afb8-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.5.83 + 100.64.5.83 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700695174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98ee6b60-898d-11ee-afb8-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/98f06230-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/98f06230-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35a1956c7ca4f6a7322551bd46118da313257eca --- /dev/null +++ b/graph/incidents_graphml/9/98f06230-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.246 + 100.64.12.246 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766006 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 98f06230-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/98f49460-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/98f49460-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8a00c86ae5e243023da85441c9025496fd9ebcfc --- /dev/null +++ b/graph/incidents_graphml/9/98f49460-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.115 + 100.64.39.115 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98f49460-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/98f5bab0-f3c2-11ee-b267-b349fce9e52a.graphml b/graph/incidents_graphml/9/98f5bab0-f3c2-11ee-b267-b349fce9e52a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6c10cd2714767f1e1ce1c4bf56b8aaaf4d82efaf --- /dev/null +++ b/graph/incidents_graphml/9/98f5bab0-f3c2-11ee-b267-b349fce9e52a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.30 + 100.64.7.30 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712372761 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 98f5bab0-f3c2-11ee-b267-b349fce9e52a + + + diff --git a/graph/incidents_graphml/9/98f7eb70-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/98f7eb70-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f63907f99559bb070e329a94251d022e7a7f60b --- /dev/null +++ b/graph/incidents_graphml/9/98f7eb70-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.200 + 100.64.38.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389532 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 98f7eb70-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/99062090-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/99062090-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5972687336a4a30e3fc6e6ea1c484f98abf9e13 --- /dev/null +++ b/graph/incidents_graphml/9/99062090-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.115 + 100.64.39.115 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224016 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99062090-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/990cefe0-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/990cefe0-898d-11ee-afb8-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4f40feebe48f7d4913988556fc30c3f2d7147524 --- /dev/null +++ b/graph/incidents_graphml/9/990cefe0-898d-11ee-afb8-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.187 + 100.64.22.187 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700695174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990cefe0-898d-11ee-afb8-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/990d6f80-5560-11ee-8e2f-e12aa4f0d6f4.graphml b/graph/incidents_graphml/9/990d6f80-5560-11ee-8e2f-e12aa4f0d6f4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae29518a9ee826df749a0505efae92edb29254ed --- /dev/null +++ b/graph/incidents_graphml/9/990d6f80-5560-11ee-8e2f-e12aa4f0d6f4.graphml @@ -0,0 +1,777 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.103 + 100.64.45.103 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.55 + 100.64.23.55 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.57 + 100.64.45.57 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.104 + USER-0015-1348.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.105 + 100.64.45.105 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.34 + 100.64.38.34 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.106 + 100.64.45.106 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.45 + 100.64.19.45 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.223 + 100.64.25.223 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.107 + 100.64.45.107 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.59 + 100.64.13.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.55 + USER-0015-1347.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.108 + USER-0015-1349.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.45.109 + 100.64.45.109 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + INCIDENT_LINK + 1694958386 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 990d6f80-5560-11ee-8e2f-e12aa4f0d6f4 + + + diff --git a/graph/incidents_graphml/9/9913dc30-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9913dc30-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b23bf5bf9482e99c49a0a1c352f77965f61c4e6b --- /dev/null +++ b/graph/incidents_graphml/9/9913dc30-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.117 + 100.64.39.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9913dc30-8544-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700224016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9913dc30-8544-11ee-89b4-37c02fa13bd9 + + + INCIDENT_LINK + 1700224016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9913dc30-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/99205b00-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/99205b00-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41fd9f90f81080c07b08b153f35937bd8c3368b1 --- /dev/null +++ b/graph/incidents_graphml/9/99205b00-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.200 + 100.64.38.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389532 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99205b00-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/9924cc20-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9924cc20-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..908f42bf0c930fdd462f0a0870177045d9524adb --- /dev/null +++ b/graph/incidents_graphml/9/9924cc20-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.117 + 100.64.39.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224016 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9924cc20-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/992532d0-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/992532d0-898d-11ee-afb8-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65cd5d42286a5d599a5ca7730b21ba0a27b7ee02 --- /dev/null +++ b/graph/incidents_graphml/9/992532d0-898d-11ee-afb8-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.175 + 100.64.67.175 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700695174 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 992532d0-898d-11ee-afb8-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/99260af0-1aa4-11ee-ae54-3b636b49055b.graphml b/graph/incidents_graphml/9/99260af0-1aa4-11ee-ae54-3b636b49055b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58db67c30aa9516c222f0c75b571d5b4de1eb6d7 --- /dev/null +++ b/graph/incidents_graphml/9/99260af0-1aa4-11ee-ae54-3b636b49055b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1109.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.29.2 + 100.64.29.2 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688500474 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99260af0-1aa4-11ee-ae54-3b636b49055b + + + diff --git a/graph/incidents_graphml/9/9926acc0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9926acc0-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1b1cb3dd97157e86fd0420fbc05c24c0bc5b25d1 --- /dev/null +++ b/graph/incidents_graphml/9/9926acc0-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,783 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.49 + 100.64.73.49 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.116 + 100.64.71.116 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.68.216 + 100.64.68.216 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.39 + 100.64.73.39 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.40 + 100.64.73.40 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.63 + 100.64.72.63 + ["Exploiting Host","Exploiting Target"] + 0.940673828125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.69 + 100.64.72.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.50 + 100.64.73.50 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.51 + 100.64.73.51 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.8.80 + 100.64.8.80 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.52 + 100.64.73.52 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.27.191 + 100.64.27.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.73.53 + 100.64.73.53 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.54 + 100.64.73.54 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.71.123 + 100.64.71.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.55 + 100.64.73.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.56 + HOST-13203 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.13.57 + 100.64.13.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.57 + 100.64.73.57 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.45.196 + 100.64.45.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.254 + HOST-13204 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144109 + malicious + 0.940673828125 + 0.940673828125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9926acc0-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/992f4bc0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/992f4bc0-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..93c8617ea36118b025e10968e44beaa26fc77ba1 --- /dev/null +++ b/graph/incidents_graphml/9/992f4bc0-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.181 + 100.64.8.181 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773017 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 992f4bc0-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/993a2f70-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/993a2f70-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2d8e8fdcc8056ed5fe37c187f5608fca8a4fa0c --- /dev/null +++ b/graph/incidents_graphml/9/993a2f70-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.227 + 100.64.40.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 993a2f70-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/993ef130-5161-11ed-8537-055dd7dfd795.graphml b/graph/incidents_graphml/9/993ef130-5161-11ed-8537-055dd7dfd795.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ee4acd3510e57ff8d6a02d50405a55dfe53d58ad --- /dev/null +++ b/graph/incidents_graphml/9/993ef130-5161-11ed-8537-055dd7dfd795.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.127 + 100.64.29.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.130 + 100.64.72.130 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1666371514 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 993ef130-5161-11ed-8537-055dd7dfd795 + + + diff --git a/graph/incidents_graphml/9/995a1380-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/995a1380-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c3acdfb48619ca2500c9520d48e1b224809651b2 --- /dev/null +++ b/graph/incidents_graphml/9/995a1380-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.227 + 100.64.40.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 995a1380-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9961b860-a812-11ee-99fc-3f84722b2bdf.graphml b/graph/incidents_graphml/9/9961b860-a812-11ee-99fc-3f84722b2bdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7492dec4d70191f85a176a08d28e5cea15de54ad --- /dev/null +++ b/graph/incidents_graphml/9/9961b860-a812-11ee-99fc-3f84722b2bdf.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.243 + 100.64.68.243 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.38 + 100.64.68.38 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","Okta","Azure Security","Protect","Windows Active Directory"] + + + INCIDENT_LINK + 1704050833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9961b860-a812-11ee-99fc-3f84722b2bdf + + + INCIDENT_LINK + 1704050833 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9961b860-a812-11ee-99fc-3f84722b2bdf + + + diff --git a/graph/incidents_graphml/9/996fa950-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/996fa950-898d-11ee-afb8-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d21cb11dfcd3e6e67ff67681dd1e401cc920c0d --- /dev/null +++ b/graph/incidents_graphml/9/996fa950-898d-11ee-afb8-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700695175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 996fa950-898d-11ee-afb8-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/99717e20-928d-11ee-92fb-e74bdedb3c0b.graphml b/graph/incidents_graphml/9/99717e20-928d-11ee-92fb-e74bdedb3c0b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0cd478009a38d91a59990c94640c17658b484c8b --- /dev/null +++ b/graph/incidents_graphml/9/99717e20-928d-11ee-92fb-e74bdedb3c0b.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.120 + 100.64.69.120 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.28 + 100.64.68.28 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1701684735 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99717e20-928d-11ee-92fb-e74bdedb3c0b + + + INCIDENT_LINK + 1701684735 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99717e20-928d-11ee-92fb-e74bdedb3c0b + + + diff --git a/graph/incidents_graphml/9/997380f0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/997380f0-15bd-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..40447dff671a25bf10eb41794107605ff5099dae --- /dev/null +++ b/graph/incidents_graphml/9/997380f0-15bd-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.157 + 100.64.72.157 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.102 + USER-0015-1636.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687961456 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 997380f0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961456 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 997380f0-15bd-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/9/997439b0-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/9/997439b0-182d-11ee-88ad-19cfc5af29bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3e3bfbd10aea2965ae5246f044b1e37dc29cf082 --- /dev/null +++ b/graph/incidents_graphml/9/997439b0-182d-11ee-88ad-19cfc5af29bb.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.39 + 100.64.54.39 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.184 + 100.64.77.184 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.24.1 + 100.64.24.1 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.185 + 100.64.77.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997439b0-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997439b0-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997439b0-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997439b0-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997439b0-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229462 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997439b0-182d-11ee-88ad-19cfc5af29bb + + + diff --git a/graph/incidents_graphml/9/997633b0-fb1c-11ed-895b-69b7bcd870e2.graphml b/graph/incidents_graphml/9/997633b0-fb1c-11ed-895b-69b7bcd870e2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7239801e9703c983552d41d85e8072cf265243d5 --- /dev/null +++ b/graph/incidents_graphml/9/997633b0-fb1c-11ed-895b-69b7bcd870e2.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.34 + 100.64.41.34 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","PAN NGFW"] + + + HOST + 100.64.43.112 + 100.64.43.112 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.51.106 + 100.64.51.106 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.104 + 100.64.10.104 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + INCIDENT_LINK + 1685033577 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997633b0-fb1c-11ed-895b-69b7bcd870e2 + + + diff --git a/graph/incidents_graphml/9/997b3b00-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/997b3b00-ee05-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0005f79b6a4b25ea099e14103d027eb68ea35d5c --- /dev/null +++ b/graph/incidents_graphml/9/997b3b00-ee05-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.86 + 100.64.78.86 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.111 + 100.64.71.111 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655446835 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 997b3b00-ee05-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655446835 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 997b3b00-ee05-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/9/997d3510-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/997d3510-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f7e3b2bdd2c2627b1aa74c83a77e46ffcc43e38c --- /dev/null +++ b/graph/incidents_graphml/9/997d3510-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.121.19.179 + 10.121.19.179 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057524 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997d3510-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057524 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 997d3510-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/997e2170-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/997e2170-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..545653546d8a8b0910f37e68745b8dc55d8ef73d --- /dev/null +++ b/graph/incidents_graphml/9/997e2170-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.73 + 100.64.23.73 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749991 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 997e2170-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/99810e70-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/99810e70-898d-11ee-afb8-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..507cf8dba3fb11d78e3df1911188b38e2dff34ab --- /dev/null +++ b/graph/incidents_graphml/9/99810e70-898d-11ee-afb8-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.112 + 100.64.8.112 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700695175 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 99810e70-898d-11ee-afb8-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/99825c00-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/99825c00-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..894b24d3e335f0abd40e56c1e582f75b56705c2f --- /dev/null +++ b/graph/incidents_graphml/9/99825c00-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.30 + HOST-11232 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99825c00-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090007 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99825c00-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9983c4c0-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9983c4c0-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a21a6e8ebe1a92b1771f2d04e4363ca65e8a1d4 --- /dev/null +++ b/graph/incidents_graphml/9/9983c4c0-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.148.1.216 + 10.148.1.216 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057525 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9983c4c0-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057525 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9983c4c0-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/998660d0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/998660d0-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4e62cafcb4784d0f6758f99aec4a80e0a0e5a19a --- /dev/null +++ b/graph/incidents_graphml/9/998660d0-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.113 + 100.64.31.113 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171286 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 998660d0-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/998c74e0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/998c74e0-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9a2af8dd185e552924004634bc297d97604dfab --- /dev/null +++ b/graph/incidents_graphml/9/998c74e0-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.186 + 100.64.35.186 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788902 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 998c74e0-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/998fdb80-898d-11ee-afb8-bf8e12a3a664.graphml b/graph/incidents_graphml/9/998fdb80-898d-11ee-afb8-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fb4fce070d70386b210d3e7a01c0944064f7ac5 --- /dev/null +++ b/graph/incidents_graphml/9/998fdb80-898d-11ee-afb8-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.233 + 100.64.25.233 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700695175 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 998fdb80-898d-11ee-afb8-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/9995ef30-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9995ef30-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..51a7a89e28c8c71f2bfbf8196da6a74a39c7fc40 --- /dev/null +++ b/graph/incidents_graphml/9/9995ef30-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.75 + 100.64.23.75 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749991 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9995ef30-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/99a2bdc0-35bb-11ee-95a2-5f9786093780.graphml b/graph/incidents_graphml/9/99a2bdc0-35bb-11ee-95a2-5f9786093780.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5dc7569efaa257535b06cd388905df93893cc20f --- /dev/null +++ b/graph/incidents_graphml/9/99a2bdc0-35bb-11ee-95a2-5f9786093780.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.223 + 100.64.66.223 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.77.184 + 100.64.77.184 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.167 + 100.64.18.167 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1691479035 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99a2bdc0-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479035 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99a2bdc0-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479035 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99a2bdc0-35bb-11ee-95a2-5f9786093780 + + + INCIDENT_LINK + 1691479035 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99a2bdc0-35bb-11ee-95a2-5f9786093780 + + + diff --git a/graph/incidents_graphml/9/99a65ec0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/99a65ec0-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..86b4ad688e8afb267831d5115f61afd2af41c49d --- /dev/null +++ b/graph/incidents_graphml/9/99a65ec0-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.30 + HOST-11232 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090007 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99a65ec0-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/99af64c0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/99af64c0-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a76c03fdf78e313f07cd57eb68b24f8ec1f29260 --- /dev/null +++ b/graph/incidents_graphml/9/99af64c0-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.23 + 100.64.8.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.59 + 100.64.73.59 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.60 + 100.64.73.60 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.10.143 + 100.64.10.143 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661144110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99af64c0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99af64c0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99af64c0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99af64c0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99af64c0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144110 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99af64c0-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/99b2be70-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/99b2be70-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fbadfa40bc7f606ec9a1ee43f3bcf3c945f26497 --- /dev/null +++ b/graph/incidents_graphml/9/99b2be70-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.20.70 + 100.64.20.70 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360826 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99b2be70-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/99b63a00-3a82-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/99b63a00-3a82-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..82b1262da4673b1422898553c57854c1bcc9bd31 --- /dev/null +++ b/graph/incidents_graphml/9/99b63a00-3a82-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.89 + 100.64.68.89 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.23 + 100.64.68.23 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1692004309 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99b63a00-3a82-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692004309 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99b63a00-3a82-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/9/99c18b80-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/99c18b80-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..32b6d2819286c7261585becdc8f652b0b9c4950d --- /dev/null +++ b/graph/incidents_graphml/9/99c18b80-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.70 + 100.64.20.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360826 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99c18b80-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/99d32ce0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/99d32ce0-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8ab532854cc635a5fcc1fe30ea7bc42ae92d3ac --- /dev/null +++ b/graph/incidents_graphml/9/99d32ce0-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.105 + 100.64.14.105 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773018 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99d32ce0-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/99dd56d0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/99dd56d0-14d6-11ed-9c5d-cfc137bdc6da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3c0d14f37c5f296af3837d8cf635f0388d9f3614 --- /dev/null +++ b/graph/incidents_graphml/9/99dd56d0-14d6-11ed-9c5d-cfc137bdc6da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.108 + 100.64.76.108 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659714745 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99dd56d0-14d6-11ed-9c5d-cfc137bdc6da + + + diff --git a/graph/incidents_graphml/9/99e3f5c0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/99e3f5c0-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..47928da0ef30c36a574396a6f4633ef4c47f1a3e --- /dev/null +++ b/graph/incidents_graphml/9/99e3f5c0-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.105 + 100.64.14.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773018 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99e3f5c0-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/99e5bd90-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/9/99e5bd90-5812-11ee-83e4-f12d78181e73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b92ebb65c95bb867b42d5ff42c180ef2e695200c --- /dev/null +++ b/graph/incidents_graphml/9/99e5bd90-5812-11ee-83e4-f12d78181e73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1695254740 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 99e5bd90-5812-11ee-83e4-f12d78181e73 + + + diff --git a/graph/incidents_graphml/9/99e76890-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/99e76890-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..11decd64ce570ca39519c94e6d5657534cdb5f9a --- /dev/null +++ b/graph/incidents_graphml/9/99e76890-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.34.103.21 + 10.34.103.21 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057525 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99e76890-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057525 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99e76890-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/99e8a3c0-5812-11ee-83e4-f12d78181e73.graphml b/graph/incidents_graphml/9/99e8a3c0-5812-11ee-83e4-f12d78181e73.graphml new file mode 100644 index 0000000000000000000000000000000000000000..289b4b872e652b729a84de72b1f9fee1944ffafb --- /dev/null +++ b/graph/incidents_graphml/9/99e8a3c0-5812-11ee-83e4-f12d78181e73.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.14 + 100.64.68.14 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + HOST + 100.64.7.160 + 100.64.7.160 + ["Exploiting Host"] + 0.578125 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1695254740 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99e8a3c0-5812-11ee-83e4-f12d78181e73 + + + diff --git a/graph/incidents_graphml/9/99ee94e0-14d6-11ed-9c5d-cfc137bdc6da.graphml b/graph/incidents_graphml/9/99ee94e0-14d6-11ed-9c5d-cfc137bdc6da.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2c6f0574a603037e423fa70466e2894c25f8671 --- /dev/null +++ b/graph/incidents_graphml/9/99ee94e0-14d6-11ed-9c5d-cfc137bdc6da.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.108 + 100.64.76.108 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659714745 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99ee94e0-14d6-11ed-9c5d-cfc137bdc6da + + + diff --git a/graph/incidents_graphml/9/99f20c70-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/9/99f20c70-70e6-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44b56f6dff86a523de18ba7a781865dbf9d92b2f --- /dev/null +++ b/graph/incidents_graphml/9/99f20c70-70e6-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.80 + HOST-11480 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.22 + 100.64.68.22 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.81 + 100.64.68.81 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1697984622 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99f20c70-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984622 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99f20c70-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984622 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99f20c70-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984622 + malicious + 0.7 + 0.6625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 99f20c70-70e6-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/9/99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b.graphml b/graph/incidents_graphml/9/99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e102a938f62ea897e8dbf848048233f7b769771f --- /dev/null +++ b/graph/incidents_graphml/9/99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.78.73 + 100.64.78.73 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.240 + 100.64.71.240 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.71.179 + USER-0015-1622.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.1.28 + USER-0015-1776.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.12 + 100.64.9.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.48.120 + 100.64.48.120 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + INCIDENT_LINK + 1657051006 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 99f23d90-fc9c-11ec-9ed9-2f136d2a6e6b + + + diff --git a/graph/incidents_graphml/9/9a0d5fc0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9a0d5fc0-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b3c377fd38e200b0c86742db9143ebf346429d72 --- /dev/null +++ b/graph/incidents_graphml/9/9a0d5fc0-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.93.199 + 192.168.93.199 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.97 + 100.64.72.97 + ["Exploiting Target","Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480587 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a0d5fc0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480587 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a0d5fc0-238e-11ee-8f53-17c8a7373bd3 + + + diff --git a/graph/incidents_graphml/9/9a101070-ec22-11ec-a400-fd786ffd5fbb.graphml b/graph/incidents_graphml/9/9a101070-ec22-11ec-a400-fd786ffd5fbb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1bf2bf8325f89ae3eaa6b42b8f37bf349a21672 --- /dev/null +++ b/graph/incidents_graphml/9/9a101070-ec22-11ec-a400-fd786ffd5fbb.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.20 + 100.64.71.20 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.21 + USER-0015-1611.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.22 + 100.64.71.22 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655239389 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a101070-ec22-11ec-a400-fd786ffd5fbb + + + INCIDENT_LINK + 1655239389 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a101070-ec22-11ec-a400-fd786ffd5fbb + + + INCIDENT_LINK + 1655239389 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a101070-ec22-11ec-a400-fd786ffd5fbb + + + INCIDENT_LINK + 1655239389 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a101070-ec22-11ec-a400-fd786ffd5fbb + + + diff --git a/graph/incidents_graphml/9/9a181740-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/9a181740-ee05-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bae5099f5bd7cc1b7ff0a1d8c7b430fa3c23c11e --- /dev/null +++ b/graph/incidents_graphml/9/9a181740-ee05-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.191 + 100.64.80.191 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.92 + USER-0015-1614.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655446836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a181740-ee05-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655446836 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a181740-ee05-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/9/9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3518833b790882343a51f3033f5465f7a6a396bb --- /dev/null +++ b/graph/incidents_graphml/9/9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.38.202 + 100.64.38.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389534 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a1b35c0-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/9a1be420-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9a1be420-085b-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..468e62657b1b034c0f4b9d2a544e519836539327 --- /dev/null +++ b/graph/incidents_graphml/9/9a1be420-085b-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.196 + 100.64.14.196 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714637499 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a1be420-085b-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/9/9a26d960-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9a26d960-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5c03c5e4147e343fb7ec51c6a4920eaf162dfb8a --- /dev/null +++ b/graph/incidents_graphml/9/9a26d960-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.241 + 100.64.11.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090008 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a26d960-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9a2f3740-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9a2f3740-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0472959054a03ce0a040a2b8566fe36c5ac9d331 --- /dev/null +++ b/graph/incidents_graphml/9/9a2f3740-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.248 + 100.64.33.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224018 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a2f3740-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe.graphml b/graph/incidents_graphml/9/9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d6f9383d422c90e2fe7caf3872bb7bdb43fd2b3e --- /dev/null +++ b/graph/incidents_graphml/9/9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.38.202 + 100.64.38.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689389534 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a3acbb0-22ba-11ee-9ea2-03cd4804d7fe + + + diff --git a/graph/incidents_graphml/9/9a404e40-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9a404e40-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a1f7e3489cc2d187227f9f51237547dd382c333d --- /dev/null +++ b/graph/incidents_graphml/9/9a404e40-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.248 + 100.64.33.248 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224018 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a404e40-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9a4673c0-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9a4673c0-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1da07780b6e0248e6b51007a2506a891cdcd0379 --- /dev/null +++ b/graph/incidents_graphml/9/9a4673c0-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.114 + 100.64.33.114 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698293001 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9a4673c0-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/9a4791f0-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/9/9a4791f0-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e52f67c0020df63240cae395c4feac52823b94f6 --- /dev/null +++ b/graph/incidents_graphml/9/9a4791f0-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.120 + 100.64.9.120 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.104 + USER-0015-1653.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9a4791f0-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9a4791f0-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/9/9a4d7af0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a4d7af0-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a265a6d65b2c5a6d0796faa89c3e7a3aaa0fc1b7 --- /dev/null +++ b/graph/incidents_graphml/9/9a4d7af0-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.190 + 100.64.35.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a4d7af0-6606-11ee-962d-dd0cd806580f + + + INCIDENT_LINK + 1696788904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a4d7af0-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9a4f0c00-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/9/9a4f0c00-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ed8061bb8dd36b3cec183b66b498f79d2e72afe2 --- /dev/null +++ b/graph/incidents_graphml/9/9a4f0c00-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.106 + 100.64.73.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.67 + 100.64.72.67 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155506 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a4f0c00-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155506 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a4f0c00-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155506 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a4f0c00-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155506 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a4f0c00-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/9/9a5372d0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a5372d0-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b1acbf09df0543721c048301a9891f46222e5765 --- /dev/null +++ b/graph/incidents_graphml/9/9a5372d0-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.77 + 100.64.23.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a5372d0-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9a540d10-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9a540d10-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..535f934ea9fce1d90f84bbb03a6caacaeddccb00 --- /dev/null +++ b/graph/incidents_graphml/9/9a540d10-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.171.160.92 + 10.171.160.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a540d10-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a540d10-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/9a562b30-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9a562b30-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bd492b1f4c1136fa032d805a3abf3b8e08919f0 --- /dev/null +++ b/graph/incidents_graphml/9/9a562b30-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,647 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.103 + 100.64.8.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.225 + 100.64.29.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.83 + 100.64.36.83 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.185 + 100.64.37.185 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.194 + 100.64.26.194 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.186 + 100.64.37.186 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.105 + 100.64.7.105 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.140 + 100.64.14.140 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.187 + 100.64.37.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.248 + 100.64.8.248 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.122 + 100.64.9.122 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.247 + 100.64.6.247 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.15 + 100.64.16.15 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.127 + 100.64.35.127 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.188 + 100.64.37.188 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293001 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a562b30-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/9a572250-f477-11ec-a9fa-937f4b53edcd.graphml b/graph/incidents_graphml/9/9a572250-f477-11ec-a9fa-937f4b53edcd.graphml new file mode 100644 index 0000000000000000000000000000000000000000..67d1e48f8747f1c978986d83e97a0705eb760412 --- /dev/null +++ b/graph/incidents_graphml/9/9a572250-f477-11ec-a9fa-937f4b53edcd.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.71.226 + 100.64.71.226 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656155506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a572250-f477-11ec-a9fa-937f4b53edcd + + + INCIDENT_LINK + 1656155506 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a572250-f477-11ec-a9fa-937f4b53edcd + + + diff --git a/graph/incidents_graphml/9/9a5bae30-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9a5bae30-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..050de3ba2a37a374e5a7d9e3e305d82600920d2c --- /dev/null +++ b/graph/incidents_graphml/9/9a5bae30-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.8.3.55 + 10.8.3.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a5bae30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057526 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a5bae30-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/9a5e91f0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a5e91f0-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..68a4da0a949c8266d1947bc9df12c1f010fc092a --- /dev/null +++ b/graph/incidents_graphml/9/9a5e91f0-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.190 + 100.64.35.190 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9a5e91f0-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8215697a0125bce55a33af442ec98f0f3b0b883a --- /dev/null +++ b/graph/incidents_graphml/9/9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.77 + 100.64.23.77 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9a69b9f0-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9a72dd40-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a72dd40-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0af7bb2de0de885917126aca7ddd092ca0ba511e --- /dev/null +++ b/graph/incidents_graphml/9/9a72dd40-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.194 + 100.64.35.194 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a72dd40-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9a786340-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/9/9a786340-182d-11ee-88ad-19cfc5af29bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..903d7866c2afb2421226e06954c9b286e36067ee --- /dev/null +++ b/graph/incidents_graphml/9/9a786340-182d-11ee-88ad-19cfc5af29bb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 192.168.170.235 + 192.168.170.235 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.77.186 + 100.64.77.186 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1688229464 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a786340-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229464 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a786340-182d-11ee-88ad-19cfc5af29bb + + + diff --git a/graph/incidents_graphml/9/9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..df48267ea6c91eabb609b64b9ed8f9b6f1a1e224 --- /dev/null +++ b/graph/incidents_graphml/9/9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a7c7ea0-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9a8098e0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9a8098e0-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..be905555f862fe0f2829433a5e8820fef22239f6 --- /dev/null +++ b/graph/incidents_graphml/9/9a8098e0-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.194 + 100.64.35.194 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788904 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9a8098e0-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9a859bd0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9a859bd0-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..539e3bad707dc36c9c866530b8f0e8e594bf3086 --- /dev/null +++ b/graph/incidents_graphml/9/9a859bd0-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.175 + 100.64.39.175 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274727 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a859bd0-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9a8fc620-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9a8fc620-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a95876ef89e489fffd594f9aaf6bb5b8b33f9694 --- /dev/null +++ b/graph/incidents_graphml/9/9a8fc620-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.58.212 + 100.64.58.212 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9a8fc620-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/9a91b450-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9a91b450-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad82472c4a13f194ef35f7b75e3e5e53adadbada --- /dev/null +++ b/graph/incidents_graphml/9/9a91b450-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.79 + 100.64.23.79 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749993 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a91b450-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9a9be2f0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9a9be2f0-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5f3b003b0978cb1af8ff8da05eae8fc1ea1e5cca --- /dev/null +++ b/graph/incidents_graphml/9/9a9be2f0-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.177 + 100.64.39.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274727 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a9be2f0-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38.graphml b/graph/incidents_graphml/9/9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80ab466eaf4762a49b378c1e604284d0152c0426 --- /dev/null +++ b/graph/incidents_graphml/9/9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.11.234 + 100.64.11.234 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.161 + 100.64.72.161 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1686806971 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38 + + + INCIDENT_LINK + 1686806971 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9a9ee800-0b3d-11ee-b3b4-cb00aeb7cc38 + + + diff --git a/graph/incidents_graphml/9/9a9ef560-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9a9ef560-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d8fe2520e1755ca2805aeec765e16bc7b54ae503 --- /dev/null +++ b/graph/incidents_graphml/9/9a9ef560-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.81 + 100.64.73.81 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.41.218 + 100.64.41.218 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370387 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a9ef560-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370387 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a9ef560-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/9/9a9f9a50-182d-11ee-88ad-19cfc5af29bb.graphml b/graph/incidents_graphml/9/9a9f9a50-182d-11ee-88ad-19cfc5af29bb.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2745a46ea2d684462856f38ae2f8e152dbd4479 --- /dev/null +++ b/graph/incidents_graphml/9/9a9f9a50-182d-11ee-88ad-19cfc5af29bb.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.72 + 100.64.72.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.179 + 100.64.75.179 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1688229464 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a9f9a50-182d-11ee-88ad-19cfc5af29bb + + + INCIDENT_LINK + 1688229464 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9a9f9a50-182d-11ee-88ad-19cfc5af29bb + + + diff --git a/graph/incidents_graphml/9/9aa040e0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9aa040e0-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4260c021abc5f30310bb2a03668b4bf789453908 --- /dev/null +++ b/graph/incidents_graphml/9/9aa040e0-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.58.212 + 100.64.58.212 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773020 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9aa040e0-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/9aa53c50-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9aa53c50-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..49847e5d40df31106e9df7c46f2bc0e2ce515ccd --- /dev/null +++ b/graph/incidents_graphml/9/9aa53c50-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.81 + 100.64.23.81 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749993 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9aa53c50-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9aa64180-3d5b-11ef-86a6-4db713805853.graphml b/graph/incidents_graphml/9/9aa64180-3d5b-11ef-86a6-4db713805853.graphml new file mode 100644 index 0000000000000000000000000000000000000000..01eb975c672d4a8a20ce2cd0536b83010ffd97d4 --- /dev/null +++ b/graph/incidents_graphml/9/9aa64180-3d5b-11ef-86a6-4db713805853.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.182 + 100.64.42.182 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720464911 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9aa64180-3d5b-11ef-86a6-4db713805853 + + + INCIDENT_LINK + 1720464911 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9aa64180-3d5b-11ef-86a6-4db713805853 + + + diff --git a/graph/incidents_graphml/9/9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5.graphml b/graph/incidents_graphml/9/9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7a0216706e2fac40846cfbe1e76c6da84a1ee33f --- /dev/null +++ b/graph/incidents_graphml/9/9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.3 + 100.64.31.3 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + INCIDENT_LINK + 1696094408 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9aaaace0-5fb5-11ee-b97f-4dc8d9506ef5 + + + diff --git a/graph/incidents_graphml/9/9aafecb0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9aafecb0-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..37b09f97f2dda5e6d56149c3d91cf7640ddf2f23 --- /dev/null +++ b/graph/incidents_graphml/9/9aafecb0-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.252 + 100.64.31.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171288 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9aafecb0-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9ab0c650-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9ab0c650-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..013d1b337d8a3934401780ddd6ebe6b64a15a797 --- /dev/null +++ b/graph/incidents_graphml/9/9ab0c650-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.187 + 100.64.33.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398686 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ab0c650-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/9aba23e0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9aba23e0-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d2579ac35517c51d986cce4377d0697a5ee4176a --- /dev/null +++ b/graph/incidents_graphml/9/9aba23e0-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.81 + 100.64.23.81 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749993 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9aba23e0-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9abb51d0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9abb51d0-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..919cf76459658148498077a9169df9588663a566 --- /dev/null +++ b/graph/incidents_graphml/9/9abb51d0-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.39.177 + 100.64.39.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274727 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9abb51d0-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9abbf110-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9abbf110-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..71af799ea388e51ed57aefca5145d10f391ee928 --- /dev/null +++ b/graph/incidents_graphml/9/9abbf110-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.253 + 100.64.13.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9abbf110-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9abdcf60-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9abdcf60-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b2a4588258beb6e1078a85e22061aa66fc6e028c --- /dev/null +++ b/graph/incidents_graphml/9/9abdcf60-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.31.252 + 100.64.31.252 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171288 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9abdcf60-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9abe8580-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9abe8580-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f82bbfafca8ca948aebfd99d0530cf47fba2b2e8 --- /dev/null +++ b/graph/incidents_graphml/9/9abe8580-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,799 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.34 + 100.64.67.34 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.85 + 100.64.63.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.35 + 100.64.67.35 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.59 + 100.64.30.59 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.2.136 + 100.64.2.136 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.54.163 + 100.64.54.163 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.53 + 100.64.29.53 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.178 + USER-0015-1483.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.75 + 100.64.7.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.58 + 100.64.13.58 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.46 + USER-0015-1484.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.79 + USER-0015-1485.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.158.1 + 172.29.158.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.36 + 100.64.67.36 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.195 + 100.64.27.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.222 + 100.64.37.222 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.37 + 100.64.67.37 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.201 + 100.64.64.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + INCIDENT_LINK + 1687090009 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9abe8580-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9ac51e60-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9ac51e60-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ac1e6a2c2ba9da286adba6e4c37a4f9390106817 --- /dev/null +++ b/graph/incidents_graphml/9/9ac51e60-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.161.239.168 + 10.161.239.168 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057527 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ac51e60-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057527 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ac51e60-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/9acb3350-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9acb3350-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fa505bf24a89bebc5d66dc953c93e45c1a695c65 --- /dev/null +++ b/graph/incidents_graphml/9/9acb3350-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.253 + 100.64.13.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9acb3350-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9acc3d90-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9acc3d90-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..439dcb04b232590acd182a0bc8ceed515ce1b68b --- /dev/null +++ b/graph/incidents_graphml/9/9acc3d90-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.187 + 100.64.33.187 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398686 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9acc3d90-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/9ad4f450-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9ad4f450-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c95f8c39549d3162ee55f199e1436895dee3a341 --- /dev/null +++ b/graph/incidents_graphml/9/9ad4f450-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.45 + 100.64.28.45 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ad4f450-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9ad80560-73b4-11ee-a6ae-7f5088e679a8.graphml b/graph/incidents_graphml/9/9ad80560-73b4-11ee-a6ae-7f5088e679a8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..808706f7174dcd8fbae04b91cc2d9a3d3b20ebf9 --- /dev/null +++ b/graph/incidents_graphml/9/9ad80560-73b4-11ee-a6ae-7f5088e679a8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.161 + 100.64.33.161 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.200.243 + 172.30.200.243 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698293002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ad80560-73b4-11ee-a6ae-7f5088e679a8 + + + INCIDENT_LINK + 1698293002 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ad80560-73b4-11ee-a6ae-7f5088e679a8 + + + diff --git a/graph/incidents_graphml/9/9ad8a0d0-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9ad8a0d0-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12d6e299ff03aebaf2eff549f8286a4a6f8a40f8 --- /dev/null +++ b/graph/incidents_graphml/9/9ad8a0d0-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.55 + 100.64.56.55 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ad8a0d0-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9addb170-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9addb170-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..81e3bd7093f23fb838f1a266b3ace8dab7b3b53e --- /dev/null +++ b/graph/incidents_graphml/9/9addb170-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.83 + 100.64.23.83 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749994 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9addb170-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9ae7bc00-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9ae7bc00-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edfff763686e7123c34b343930c57e3d1d456a10 --- /dev/null +++ b/graph/incidents_graphml/9/9ae7bc00-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.56.55 + 100.64.56.55 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360828 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ae7bc00-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9aea02f0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9aea02f0-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..64fa6c961f4f39afc5f03d413ab1470de7de6eba --- /dev/null +++ b/graph/incidents_graphml/9/9aea02f0-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.45 + 100.64.28.45 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274728 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9aea02f0-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9af09f80-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/9af09f80-f340-11ec-a343-c72f25ca2eb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..72c8a7c4846544dc8dc8fa83af0aeaf85e771189 --- /dev/null +++ b/graph/incidents_graphml/9/9af09f80-f340-11ec-a343-c72f25ca2eb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.99 + 100.64.77.99 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656021934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9af09f80-f340-11ec-a343-c72f25ca2eb2 + + + INCIDENT_LINK + 1656021934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9af09f80-f340-11ec-a343-c72f25ca2eb2 + + + diff --git a/graph/incidents_graphml/9/9af151c0-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9af151c0-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e4ab71b8dc5ebe8158118ce6f4c0de7378adf815 --- /dev/null +++ b/graph/incidents_graphml/9/9af151c0-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.244 + 100.64.52.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398686 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9af151c0-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/9af2f460-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9af2f460-0ebf-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ca23f67d95011a3da0242a32de9824588b134a9 --- /dev/null +++ b/graph/incidents_graphml/9/9af2f460-0ebf-11ee-9392-932bfd273540.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.192 + 100.64.72.192 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.193 + 100.64.72.193 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687192659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9af2f460-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192659 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9af2f460-0ebf-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/9/9af47010-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/9af47010-f340-11ec-a343-c72f25ca2eb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d92bd224a6c616dc4e9e40a098b8cb9837a7df4f --- /dev/null +++ b/graph/incidents_graphml/9/9af47010-f340-11ec-a343-c72f25ca2eb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.100 + USER-0015-1753.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.101 + USER-0015-1754.example.internal + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656021934 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9af47010-f340-11ec-a343-c72f25ca2eb2 + + + INCIDENT_LINK + 1656021934 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9af47010-f340-11ec-a343-c72f25ca2eb2 + + + diff --git a/graph/incidents_graphml/9/9af75640-f340-11ec-a343-c72f25ca2eb2.graphml b/graph/incidents_graphml/9/9af75640-f340-11ec-a343-c72f25ca2eb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b53dc9e0a5e7ffa2b5fe23315198b4e67962694d --- /dev/null +++ b/graph/incidents_graphml/9/9af75640-f340-11ec-a343-c72f25ca2eb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.121 + 100.64.43.121 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656021934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9af75640-f340-11ec-a343-c72f25ca2eb2 + + + INCIDENT_LINK + 1656021934 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9af75640-f340-11ec-a343-c72f25ca2eb2 + + + diff --git a/graph/incidents_graphml/9/9af9e470-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9af9e470-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2be52f7d56e2463f1f951bc53dcd9c11aa210d15 --- /dev/null +++ b/graph/incidents_graphml/9/9af9e470-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.4 + 100.64.29.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360828 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9af9e470-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9b057520-79e2-11ee-9fa1-09d380781a0d.graphml b/graph/incidents_graphml/9/9b057520-79e2-11ee-9fa1-09d380781a0d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b9cac57406c0cda5655f1b24777c67ece3e2b658 --- /dev/null +++ b/graph/incidents_graphml/9/9b057520-79e2-11ee-9fa1-09d380781a0d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.76 + 100.64.7.76 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1698972466 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b057520-79e2-11ee-9fa1-09d380781a0d + + + diff --git a/graph/incidents_graphml/9/9b06f070-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/9/9b06f070-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f3914f95ea4c9cc624a33cdd0d4dd88366fafca --- /dev/null +++ b/graph/incidents_graphml/9/9b06f070-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.240 + 100.64.77.240 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690855408 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b06f070-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/9/9b0926b0-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9b0926b0-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3745da10e4f2826579f67366abe304740446b202 --- /dev/null +++ b/graph/incidents_graphml/9/9b0926b0-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.4 + 100.64.29.4 + ["Exploiting Host","Exploiting Target"] + 0.87625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360828 + malicious + 0.87625 + 0.87625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b0926b0-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9b0f8820-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9b0f8820-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e2eadc7635b034113c38771b7d2d32948c4dd26a --- /dev/null +++ b/graph/incidents_graphml/9/9b0f8820-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.244 + 100.64.52.244 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398686 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9b0f8820-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/9b1cfac0-09ab-11ef-a326-59a1bcca7fdf.graphml b/graph/incidents_graphml/9/9b1cfac0-09ab-11ef-a326-59a1bcca7fdf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1f243dd62a5c65c3043ec46414be795ef2f8b3d1 --- /dev/null +++ b/graph/incidents_graphml/9/9b1cfac0-09ab-11ef-a326-59a1bcca7fdf.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.105 + 100.64.31.105 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.45 + 100.64.49.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.46 + 100.64.49.46 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714781811 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781811 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781811 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781811 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781811 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf + + + INCIDENT_LINK + 1714781811 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b1cfac0-09ab-11ef-a326-59a1bcca7fdf + + + diff --git a/graph/incidents_graphml/9/9b2593a0-3cab-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/9/9b2593a0-3cab-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6b4b4995f1ffb2feb087df3897fafb495e4cf639 --- /dev/null +++ b/graph/incidents_graphml/9/9b2593a0-3cab-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.17.160.55 + USER-0015-1988.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.87.241 + 100.64.87.241 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720389321 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b2593a0-3cab-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720389321 + malicious + 0.7 + 0.4375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b2593a0-3cab-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/9/9b291e70-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/9/9b291e70-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e021f5846fcdb4074323026c8a7289a21431e3ba --- /dev/null +++ b/graph/incidents_graphml/9/9b291e70-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.2 + 100.64.77.2 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.240 + 100.64.77.240 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690855408 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9b291e70-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/9/9b3257c0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9b3257c0-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8c165bd7fe3796f3dd25cd7474742680a080aca --- /dev/null +++ b/graph/incidents_graphml/9/9b3257c0-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.146.218.32 + 10.146.218.32 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.98 + 100.64.72.98 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480589 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b3257c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480589 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b3257c0-238e-11ee-8f53-17c8a7373bd3 + + + diff --git a/graph/incidents_graphml/9/9b400350-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9b400350-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..75d5b3bbee4967196f47acf4b84f88be1c122b88 --- /dev/null +++ b/graph/incidents_graphml/9/9b400350-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.218 + 100.64.36.218 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b400350-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/9b404bb0-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/9/9b404bb0-9eb7-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..36331b7bb0daad0f20e4d68ad17302e179723e4d --- /dev/null +++ b/graph/incidents_graphml/9/9b404bb0-9eb7-11ee-9861-037a800baf91.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + INCIDENT_LINK + 1703022191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b404bb0-9eb7-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/9/9b44d580-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9b44d580-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..76c180384901b01d5cef0cf14bdf85379f5bc164 --- /dev/null +++ b/graph/incidents_graphml/9/9b44d580-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.153 + 100.64.8.153 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315925 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b44d580-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9b4fbac0-dc1d-11ee-a712-878bc23f81d5.graphml b/graph/incidents_graphml/9/9b4fbac0-dc1d-11ee-a712-878bc23f81d5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b7a6273151c0d0e054a00548c395cd10fc4cbe23 --- /dev/null +++ b/graph/incidents_graphml/9/9b4fbac0-dc1d-11ee-a712-878bc23f81d5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.218 + 100.64.36.218 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1709773021 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b4fbac0-dc1d-11ee-a712-878bc23f81d5 + + + diff --git a/graph/incidents_graphml/9/9b5329b0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9b5329b0-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1d29367e247c43ec7dd625fbfb15c7584e22cffd --- /dev/null +++ b/graph/incidents_graphml/9/9b5329b0-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,373 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.61 + 100.64.73.61 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.253 + 100.64.70.253 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.1.49 + 100.64.1.49 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.30.26 + 100.64.30.26 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.62 + 100.64.73.62 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.14.22 + 100.64.14.22 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.63 + 100.64.73.63 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.3.124 + 100.64.3.124 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.64 + 100.64.73.64 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.167 + 100.64.72.167 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b5329b0-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/9b533770-9eb7-11ee-9861-037a800baf91.graphml b/graph/incidents_graphml/9/9b533770-9eb7-11ee-9861-037a800baf91.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27d72a49d4ecf1ac49184d2a60d54c0df1f8bc46 --- /dev/null +++ b/graph/incidents_graphml/9/9b533770-9eb7-11ee-9861-037a800baf91.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 100.64.6.199 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.8.70 + 100.64.8.70 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1703022191 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b533770-9eb7-11ee-9861-037a800baf91 + + + diff --git a/graph/incidents_graphml/9/9b53e7b0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9b53e7b0-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..00fbebcb01affe5df3c8ff880656688fb3c6e17a --- /dev/null +++ b/graph/incidents_graphml/9/9b53e7b0-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.42 + 100.64.67.42 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b53e7b0-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9b54fe70-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9b54fe70-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b65a22788f3bfdfb2250d6f5375d730f8396c653 --- /dev/null +++ b/graph/incidents_graphml/9/9b54fe70-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,171 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.31.217 + 100.64.31.217 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.34.250 + 100.64.34.250 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.16.220 + 100.64.16.220 + ["Exploiting Host","Exploiting Target"] + 0.983125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.66 + USER-0015-1649.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144113 + malicious + 0.983125 + 0.983125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b54fe70-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ddff3389d385b9863938bcb4bb2128ff55e81bcf --- /dev/null +++ b/graph/incidents_graphml/9/9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,547 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.66.248 + 100.64.66.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.23.117 + 172.26.23.117 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.249 + 100.64.66.249 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.250 + 100.64.66.250 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.251 + 100.64.66.251 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.252 + 100.64.66.252 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.41 + 100.64.20.41 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.222 + 100.64.9.222 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.25.58 + 100.64.25.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.57.200 + 100.64.57.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.253 + 100.64.66.253 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.254 + 100.64.66.254 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.255 + 100.64.66.255 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766010 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b60ed00-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/9b6211f0-8544-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9b6211f0-8544-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a469563923e78282ec343101d18ff97aa6355c7 --- /dev/null +++ b/graph/incidents_graphml/9/9b6211f0-8544-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.119 + 100.64.39.119 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700224020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b6211f0-8544-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f721471901870a83dc55bb1c5733ca53d99cf687 --- /dev/null +++ b/graph/incidents_graphml/9/9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.209 + 100.64.80.209 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1656920012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b647fd0-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd86396943df32970312cb9826d6b683a252e55e --- /dev/null +++ b/graph/incidents_graphml/9/9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.209 + 100.64.80.209 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656920012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9b6961d0-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9b6cd220-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b6cd220-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ec293f5625731547bdb174e91f5bb7c33b46cf2e --- /dev/null +++ b/graph/incidents_graphml/9/9b6cd220-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.123 + 100.64.77.123 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320899 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b6cd220-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9b6ec2b0-0dd0-11ee-9fca-b36927191846.graphml b/graph/incidents_graphml/9/9b6ec2b0-0dd0-11ee-9fca-b36927191846.graphml new file mode 100644 index 0000000000000000000000000000000000000000..551b2c0e6c75faa747a87ce7e71f8ae1869548dc --- /dev/null +++ b/graph/incidents_graphml/9/9b6ec2b0-0dd0-11ee-9fca-b36927191846.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.42 + 100.64.67.42 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687090010 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b6ec2b0-0dd0-11ee-9fca-b36927191846 + + + diff --git a/graph/incidents_graphml/9/9b70f290-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9b70f290-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6dfc1bef5226a652bd123039b6a715150872df7a --- /dev/null +++ b/graph/incidents_graphml/9/9b70f290-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.66.248 + 100.64.66.248 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766011 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9b70f290-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/9b71fa90-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9b71fa90-9947-11ee-986d-1bbc30865dce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d612ef37b74074dde32a09dcebba3313e5148b27 --- /dev/null +++ b/graph/incidents_graphml/9/9b71fa90-9947-11ee-986d-1bbc30865dce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.127 + 100.64.36.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702424332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b71fa90-9947-11ee-986d-1bbc30865dce + + + diff --git a/graph/incidents_graphml/9/9b72ec90-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9b72ec90-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cea297984d7dcca5b91bd1b99b3555aa815c6992 --- /dev/null +++ b/graph/incidents_graphml/9/9b72ec90-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,221 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.190 + 100.64.64.190 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.139 + USER-0015-1462.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.47 + 100.64.33.47 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.26.101 + 100.64.26.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.191 + 100.64.64.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738287 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b72ec90-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/9/9b73fe10-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b73fe10-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb1baf33d61c79bedd6a5f43e2cbe6f29ae52de3 --- /dev/null +++ b/graph/incidents_graphml/9/9b73fe10-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.123 + 100.64.77.123 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320899 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b73fe10-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9b788160-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9b788160-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e33de99d4d89ea0e16c6c2cccb7a98700a7512d --- /dev/null +++ b/graph/incidents_graphml/9/9b788160-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.23.45 + 100.64.23.45 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139298 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b788160-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/9/9b78e010-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b78e010-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e06a1eae3ebd07784ab1e6e2950df9292338ad19 --- /dev/null +++ b/graph/incidents_graphml/9/9b78e010-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.221 + 100.64.76.221 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320899 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b78e010-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9b7ca6a0-2c8a-11ed-be76-c750f0345c87.graphml b/graph/incidents_graphml/9/9b7ca6a0-2c8a-11ed-be76-c750f0345c87.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ce1a0819d47325f8ec3049cd8441fa6405da168e --- /dev/null +++ b/graph/incidents_graphml/9/9b7ca6a0-2c8a-11ed-be76-c750f0345c87.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.75 + 100.64.75.75 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.1.226 + 100.64.1.226 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.76 + 100.64.75.76 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1662320934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b7ca6a0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b7ca6a0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b7ca6a0-2c8a-11ed-be76-c750f0345c87 + + + INCIDENT_LINK + 1662320934 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b7ca6a0-2c8a-11ed-be76-c750f0345c87 + + + diff --git a/graph/incidents_graphml/9/9b7f4100-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9b7f4100-9947-11ee-986d-1bbc30865dce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15e3ea66328b6eff32e47045ec93416bd3f69716 --- /dev/null +++ b/graph/incidents_graphml/9/9b7f4100-9947-11ee-986d-1bbc30865dce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.36.127 + 100.64.36.127 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702424332 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9b7f4100-9947-11ee-986d-1bbc30865dce + + + diff --git a/graph/incidents_graphml/9/9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c9759cefb966e5cd4bdc9b97a1dd9beb477ad8b --- /dev/null +++ b/graph/incidents_graphml/9/9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.91 + USER-0015-1718.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1656920013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b80ba60-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9b814480-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b814480-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6180d08003d6fa0641d43c68afd6a917e903076e --- /dev/null +++ b/graph/incidents_graphml/9/9b814480-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.89453125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.76.221 + 100.64.76.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659320899 + malicious + 0.89453125 + 0.89453125 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b814480-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/9/9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..979b6f1c2d00902f8cbdbabd57c250c9fd077d3e --- /dev/null +++ b/graph/incidents_graphml/9/9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.127 + 100.64.81.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.72.160 + HOST-13816 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681490662 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5 + + + INCIDENT_LINK + 1681490662 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b8799e0-dae3-11ed-a0d7-3bfb9ea10ce5 + + + diff --git a/graph/incidents_graphml/9/9b8b0cd0-2122-11ee-9a61-05dd24aa353e.graphml b/graph/incidents_graphml/9/9b8b0cd0-2122-11ee-9a61-05dd24aa353e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0d63550b2c5ed6a3cfaa7aed6e87f0ace47185e3 --- /dev/null +++ b/graph/incidents_graphml/9/9b8b0cd0-2122-11ee-9a61-05dd24aa353e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.1 + 100.64.18.1 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.69.129 + 100.64.69.129 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1689214301 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b8b0cd0-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214301 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b8b0cd0-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214301 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b8b0cd0-2122-11ee-9a61-05dd24aa353e + + + INCIDENT_LINK + 1689214301 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b8b0cd0-2122-11ee-9a61-05dd24aa353e + + + diff --git a/graph/incidents_graphml/9/9b8c1570-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9b8c1570-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1403a3a95dba1208c5022be3e9cd2e09f2996b6 --- /dev/null +++ b/graph/incidents_graphml/9/9b8c1570-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.196 + 100.64.35.196 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788906 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b8c1570-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c2cd879f5b1582f9426208171329e508fe610a9e --- /dev/null +++ b/graph/incidents_graphml/9/9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.91 + USER-0015-1718.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656920013 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b8dd9c0-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9b942e30-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9b942e30-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8d4d32c84230dd136a5c8227255613e73ede7968 --- /dev/null +++ b/graph/incidents_graphml/9/9b942e30-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.250 + 100.64.73.250 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.73.92 + 100.64.73.92 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Cisco Meraki Firewall","Meraki","Umbrella"] + + + HOST + 100.64.82.208 + 100.64.82.208 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.129 + 100.64.72.129 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.82.209 + 100.64.82.209 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b942e30-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/9b96c640-a979-11ed-965d-a1a801bb61f1.graphml b/graph/incidents_graphml/9/9b96c640-a979-11ed-965d-a1a801bb61f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..98d492160deb6b27e6d0b357ddc354e97fb4e982 --- /dev/null +++ b/graph/incidents_graphml/9/9b96c640-a979-11ed-965d-a1a801bb61f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.99.139.57 + 10.99.139.57 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 10.185.63.242 + 10.185.63.242 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1676057528 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b96c640-a979-11ed-965d-a1a801bb61f1 + + + INCIDENT_LINK + 1676057528 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9b96c640-a979-11ed-965d-a1a801bb61f1 + + + diff --git a/graph/incidents_graphml/9/9b979f00-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/9/9b979f00-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e3aba183a9c6790ad03280195a9f8912ed74a6ec --- /dev/null +++ b/graph/incidents_graphml/9/9b979f00-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.150 + 100.64.35.150 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548914 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b979f00-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/9/9b991240-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9b991240-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b8d0672bc7102f83af3bc5c3accbb6c69a72ff52 --- /dev/null +++ b/graph/incidents_graphml/9/9b991240-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.68.39 + USER-0015-1756.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320899 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9b991240-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9b9cb740-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9b9cb740-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69a127fcd2baa7d6f9ef1b2abbec915022e73278 --- /dev/null +++ b/graph/incidents_graphml/9/9b9cb740-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.196 + 100.64.35.196 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788906 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9b9cb740-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9ba12890-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9ba12890-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..de95df3920c6852fa38c9eaeea4615633c99db9f --- /dev/null +++ b/graph/incidents_graphml/9/9ba12890-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.68.39 + USER-0015-1756.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320900 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ba12890-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9ba17330-2bbc-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/9/9ba17330-2bbc-11ef-b37a-07248b6407de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0df32a4f95f69d9bcae5539130962503c3519d9b --- /dev/null +++ b/graph/incidents_graphml/9/9ba17330-2bbc-11ef-b37a-07248b6407de.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.66 + USER-0015-1248.example.internal + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.67 + USER-0015-1242.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.68 + 100.64.24.68 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ba17330-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ba17330-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ba17330-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ba17330-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ba17330-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ba17330-2bbc-11ef-b37a-07248b6407de + + + diff --git a/graph/incidents_graphml/9/9ba17870-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9ba17870-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58f03f6632fa458074ed88a774f8cf9238a49fc3 --- /dev/null +++ b/graph/incidents_graphml/9/9ba17870-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.8 + 100.64.67.8 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766011 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ba17870-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766011 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ba17870-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/9ba435c0-ee18-11ee-9562-c14cd4b3a5e3.graphml b/graph/incidents_graphml/9/9ba435c0-ee18-11ee-9562-c14cd4b3a5e3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..28943dfca3a015d19343a5336cb222cb9a10e1a0 --- /dev/null +++ b/graph/incidents_graphml/9/9ba435c0-ee18-11ee-9562-c14cd4b3a5e3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.85 + 100.64.23.85 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1711749995 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9ba435c0-ee18-11ee-9562-c14cd4b3a5e3 + + + diff --git a/graph/incidents_graphml/9/9ba59f10-a241-11ed-98e5-7fafbdfab608.graphml b/graph/incidents_graphml/9/9ba59f10-a241-11ed-98e5-7fafbdfab608.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ebe77478731dbd7416c57623885b1bfd2396e562 --- /dev/null +++ b/graph/incidents_graphml/9/9ba59f10-a241-11ed-98e5-7fafbdfab608.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.54.98 + 100.64.54.98 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1675263818 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ba59f10-a241-11ed-98e5-7fafbdfab608 + + + diff --git a/graph/incidents_graphml/9/9ba5e380-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9ba5e380-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..308afaee494915cef43ed1cf36f9e9e246b61d02 --- /dev/null +++ b/graph/incidents_graphml/9/9ba5e380-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.75.125 + USER-0015-1757.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320900 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ba5e380-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e908a5f870aee8cee12a7f6c874ae1e7f1b19fee --- /dev/null +++ b/graph/incidents_graphml/9/9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,99 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.18 + USER-0015-1780.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.80.210 + 100.64.80.210 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.73.106 + 100.64.73.106 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656920013 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9 + + + INCIDENT_LINK + 1656920013 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9 + + + INCIDENT_LINK + 1656920013 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ba81880-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9baa3ca0-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/9/9baa3ca0-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cbae5282a993bc959fe336a262bbf79523cac271 --- /dev/null +++ b/graph/incidents_graphml/9/9baa3ca0-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.152 + 100.64.35.152 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548914 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9baa3ca0-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/9/9badf9d0-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9badf9d0-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9af439f8e7b522a9a11ca35e36af93ec41a7826 --- /dev/null +++ b/graph/incidents_graphml/9/9badf9d0-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.75.125 + USER-0015-1757.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320900 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9badf9d0-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9bb39ba0-2bbc-11ef-b37a-07248b6407de.graphml b/graph/incidents_graphml/9/9bb39ba0-2bbc-11ef-b37a-07248b6407de.graphml new file mode 100644 index 0000000000000000000000000000000000000000..58e2431843034ea166168c455a795fe2d2337f67 --- /dev/null +++ b/graph/incidents_graphml/9/9bb39ba0-2bbc-11ef-b37a-07248b6407de.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.72 + 100.64.24.72 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.73 + 100.64.24.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.74 + 100.64.24.74 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.75 + USER-0015-1249.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + INCIDENT_LINK + 1718527453 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bb39ba0-2bbc-11ef-b37a-07248b6407de + + + diff --git a/graph/incidents_graphml/9/9bb42160-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/9/9bb42160-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44628abbffa0963fed36dc577fd5218c121b0646 --- /dev/null +++ b/graph/incidents_graphml/9/9bb42160-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.34 + 100.64.18.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703201 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9bb42160-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/9/9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..944066856d403ddd994e2a1e5e1ae508c5f2422d --- /dev/null +++ b/graph/incidents_graphml/9/9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.226 + USER-0015-1727.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.135 + 100.64.77.135 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656920013 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9bb58600-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9bb8bb90-3f76-11ee-a907-25e49d688e74.graphml b/graph/incidents_graphml/9/9bb8bb90-3f76-11ee-a907-25e49d688e74.graphml new file mode 100644 index 0000000000000000000000000000000000000000..267b30f76264d693972f2c0fdc7fedf0bf726cdc --- /dev/null +++ b/graph/incidents_graphml/9/9bb8bb90-3f76-11ee-a907-25e49d688e74.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.152 + 100.64.35.152 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692548914 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9bb8bb90-3f76-11ee-a907-25e49d688e74 + + + diff --git a/graph/incidents_graphml/9/9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6fe29dca019b8be80864bc0a5c75a7d77f097686 --- /dev/null +++ b/graph/incidents_graphml/9/9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.211 + USER-0015-1851.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1656920013 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9bb9a4b0-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9bbc78c0-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9bbc78c0-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fb7950541d0ef14fa1fc5a8ed497ab094d67472c --- /dev/null +++ b/graph/incidents_graphml/9/9bbc78c0-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.9.103 + 100.64.9.103 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1659320900 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9bbc78c0-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9.graphml b/graph/incidents_graphml/9/9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..272da79af278189e4394b55f35bc97925dbb6d52 --- /dev/null +++ b/graph/incidents_graphml/9/9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.80.211 + USER-0015-1851.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656920013 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9bbfbf30-fb6b-11ec-a1a2-6b18c9b1ede9 + + + diff --git a/graph/incidents_graphml/9/9bc0be80-1141-11ed-872b-6f6effadac60.graphml b/graph/incidents_graphml/9/9bc0be80-1141-11ed-872b-6f6effadac60.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d7420e5818b88f77ff3f001abfd7ddae35cfa864 --- /dev/null +++ b/graph/incidents_graphml/9/9bc0be80-1141-11ed-872b-6f6effadac60.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.227 + 100.64.70.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.77.125 + USER-0015-1758.example.internal + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1659320900 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9bc0be80-1141-11ed-872b-6f6effadac60 + + + diff --git a/graph/incidents_graphml/9/9bcfd040-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9bcfd040-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c9c3ef1439a8c042233d97b9683d1a9038a9b651 --- /dev/null +++ b/graph/incidents_graphml/9/9bcfd040-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.99 + USER-0015-1634.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.52 + 100.64.72.52 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.66.32 + 100.64.66.32 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.100 + 100.64.72.100 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.17.55 + 100.64.17.55 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.72.101 + 100.64.72.101 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.12.144 + 100.64.12.144 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.38.180 + 100.64.38.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480590 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bcfd040-238e-11ee-8f53-17c8a7373bd3 + + + diff --git a/graph/incidents_graphml/9/9bd57cc0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9bd57cc0-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96575d5a679d7f9a50caa881959aa06dcfec6a79 --- /dev/null +++ b/graph/incidents_graphml/9/9bd57cc0-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.129 + 100.64.27.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315926 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9bd57cc0-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9be47630-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/9be47630-020f-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9bfae09b8ad28481c8151e01b6ccd350bc01d6df --- /dev/null +++ b/graph/incidents_graphml/9/9be47630-020f-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.36 + 100.64.55.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.74.71 + 100.64.74.71 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.19.12 + 100.64.19.12 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.12.89 + 100.64.12.89 + ["Exploiting Host","Exploiting Target"] + 0.915625 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.15.194 + 100.64.15.194 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797656 + malicious + 0.915625 + 0.915625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9be47630-020f-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/9/9be66900-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9be66900-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ae5a062c6f1db04dc2b355deeb67c242068cbaeb --- /dev/null +++ b/graph/incidents_graphml/9/9be66900-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,229 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.67 + 100.64.73.67 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.68 + 100.64.73.68 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.158 + USER-0015-1647.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.69 + 100.64.73.69 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.70 + 100.64.73.70 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.221 + 100.64.71.221 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.71 + 100.64.73.71 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9be66900-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/9be864d0-21d6-11ed-900b-09bc7217b13b.graphml b/graph/incidents_graphml/9/9be864d0-21d6-11ed-900b-09bc7217b13b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eeb3c2a7968615b4baa152ee0e19dd12a488d029 --- /dev/null +++ b/graph/incidents_graphml/9/9be864d0-21d6-11ed-900b-09bc7217b13b.graphml @@ -0,0 +1,301 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.42 + 100.64.73.42 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.224 + 100.64.71.224 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.43 + 100.64.73.43 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.44 + 100.64.73.44 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.45 + 100.64.73.45 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.46 + 100.64.73.46 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.79 + 100.64.72.79 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.47 + 100.64.73.47 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.130 + 100.64.71.130 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + INCIDENT_LINK + 1661144114 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9be864d0-21d6-11ed-900b-09bc7217b13b + + + diff --git a/graph/incidents_graphml/9/9bec7cf0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9bec7cf0-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..aa3e939c5f423b564586420f069cf5a19264ff48 --- /dev/null +++ b/graph/incidents_graphml/9/9bec7cf0-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.198 + 100.64.49.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bec7cf0-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9bf0f400-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9bf0f400-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e970cc77ffcd924c5ed1507f22ba8117e3590e1e --- /dev/null +++ b/graph/incidents_graphml/9/9bf0f400-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.129 + 100.64.27.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9bf0f400-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9bfc2710-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9bfc2710-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..eb153045fb87109751ee15e80cb4918fdcd02733 --- /dev/null +++ b/graph/incidents_graphml/9/9bfc2710-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.80.119 + 100.64.80.119 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685766302 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bfc2710-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766302 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9bfc2710-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/9/9bfdbb00-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9bfdbb00-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1890a0e2be6197b12e2b4af0e481a5a759d6744b --- /dev/null +++ b/graph/incidents_graphml/9/9bfdbb00-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.49.200 + 100.64.49.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658540 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9bfdbb00-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c0c8810-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c0c8810-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..590a71dcc9d147581818067759f82a3802848c57 --- /dev/null +++ b/graph/incidents_graphml/9/9c0c8810-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.49.200 + 100.64.49.200 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658540 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c0c8810-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c1f5700-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9c1f5700-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..77772edda23bc6d7fe9df8ab99e7d91045688223 --- /dev/null +++ b/graph/incidents_graphml/9/9c1f5700-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315927 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c1f5700-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml b/graph/incidents_graphml/9/9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c7536ffc2d4873773bf48c0f917a1e17d8172730 --- /dev/null +++ b/graph/incidents_graphml/9/9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + HOST + 100.64.81.128 + 100.64.81.128 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1681490663 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c3936a0-dae3-11ed-a0d7-3bfb9ea10ce5 + + + diff --git a/graph/incidents_graphml/9/9c426f60-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9c426f60-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..656a6c08225c08faf68c688001a820beb5583a81 --- /dev/null +++ b/graph/incidents_graphml/9/9c426f60-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.221 + 100.64.12.221 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315927 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c426f60-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9c46b920-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9c46b920-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f71a5506274c731162e23f5bce95510d06d132ac --- /dev/null +++ b/graph/incidents_graphml/9/9c46b920-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,265 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.10.210 + 100.64.10.210 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.10 + 100.64.67.10 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.11 + USER-0015-1482.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.157 + 100.64.14.157 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.12 + 100.64.67.12 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.122 + USER-0015-1214.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c46b920-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/9c4decc0-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9c4decc0-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cb7bd4451ef26e581ce18a2e25c50cba2d5c19f7 --- /dev/null +++ b/graph/incidents_graphml/9/9c4decc0-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.113 + 100.64.18.113 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780414 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c4decc0-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/9/9c567090-6ee9-11ee-ab04-93e2c60bb3fe.graphml b/graph/incidents_graphml/9/9c567090-6ee9-11ee-ab04-93e2c60bb3fe.graphml new file mode 100644 index 0000000000000000000000000000000000000000..859f353eff0abce90f91c1fdf2f6be5f3d0a9d36 --- /dev/null +++ b/graph/incidents_graphml/9/9c567090-6ee9-11ee-ab04-93e2c60bb3fe.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.16 + 100.64.67.16 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697766012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c567090-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c567090-6ee9-11ee-ab04-93e2c60bb3fe + + + INCIDENT_LINK + 1697766012 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c567090-6ee9-11ee-ab04-93e2c60bb3fe + + + diff --git a/graph/incidents_graphml/9/9c5ad720-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9c5ad720-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bde33fc9a16240c418b6d68d31298fa76c5c305 --- /dev/null +++ b/graph/incidents_graphml/9/9c5ad720-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.35.198 + 100.64.35.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c5ad720-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9c5df250-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9c5df250-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d0ca2e9245c873cc1dc50cb12ee1d98f4b6cb6c --- /dev/null +++ b/graph/incidents_graphml/9/9c5df250-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.115 + 100.64.18.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780414 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c5df250-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/9/9c63f6e0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c63f6e0-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f64ed4f3831290d1cab57ad44fbea7e0f40c8902 --- /dev/null +++ b/graph/incidents_graphml/9/9c63f6e0-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c63f6e0-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c6bcd80-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9c6bcd80-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3f261f0b625566c867fcd37c6c259010ca0a43a5 --- /dev/null +++ b/graph/incidents_graphml/9/9c6bcd80-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.173 + 100.64.23.173 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171291 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c6bcd80-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9c6c4a30-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9c6c4a30-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42d6ff1f4bf801bef546df566e83b6afcca58e2a --- /dev/null +++ b/graph/incidents_graphml/9/9c6c4a30-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.54.66 + 172.24.54.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.115 + 100.64.18.115 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780414 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c6c4a30-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/9/9c6dc2e0-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9c6dc2e0-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..145e150d02863947c5059afebf8e9bce9e792ef6 --- /dev/null +++ b/graph/incidents_graphml/9/9c6dc2e0-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.198 + 100.64.35.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788907 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9c6dc2e0-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9c724ec0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c724ec0-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6bab8d07e2aa32cfa4b2b9776202cf197a6068f0 --- /dev/null +++ b/graph/incidents_graphml/9/9c724ec0-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.109 + 100.64.7.109 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658541 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c724ec0-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c796210-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9c796210-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c225da670312b42160f7848a4b969f50f6e1d090 --- /dev/null +++ b/graph/incidents_graphml/9/9c796210-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.173 + 100.64.23.173 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c796210-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9c7e5cb0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c7e5cb0-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..edcd70f420365a3543094a7a622b6e9c6a4088c7 --- /dev/null +++ b/graph/incidents_graphml/9/9c7e5cb0-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c7e5cb0-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c8117f0-df14-11ee-9778-4184b1db151c.graphml b/graph/incidents_graphml/9/9c8117f0-df14-11ee-9778-4184b1db151c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..80ef479f2a994659cff2256dfdeeee2a02fce652 --- /dev/null +++ b/graph/incidents_graphml/9/9c8117f0-df14-11ee-9778-4184b1db151c.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.238 + 100.64.9.238 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.239 + 100.64.9.239 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.240 + 100.64.9.240 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.241 + 100.64.9.241 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.242 + 100.64.9.242 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.5.59 + 100.64.5.59 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.243 + 100.64.9.243 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.244 + 100.64.9.244 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + INCIDENT_LINK + 1710099011 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c8117f0-df14-11ee-9778-4184b1db151c + + + diff --git a/graph/incidents_graphml/9/9c831500-274f-11ee-9ae4-f7600c9ae4b6.graphml b/graph/incidents_graphml/9/9c831500-274f-11ee-9ae4-f7600c9ae4b6.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41d61c404d84b73af6fd80fef74c93b649a033b2 --- /dev/null +++ b/graph/incidents_graphml/9/9c831500-274f-11ee-9ae4-f7600c9ae4b6.graphml @@ -0,0 +1,149 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.63.47 + 100.64.63.47 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.121 + 100.64.21.121 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.48 + 100.64.63.48 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689893337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c831500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c831500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c831500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c831500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c831500-274f-11ee-9ae4-f7600c9ae4b6 + + + INCIDENT_LINK + 1689893337 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9c831500-274f-11ee-9ae4-f7600c9ae4b6 + + + diff --git a/graph/incidents_graphml/9/9c8c3f60-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c8c3f60-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..402e81f178038a8ac4374661e8b3223c037870fb --- /dev/null +++ b/graph/incidents_graphml/9/9c8c3f60-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658541 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9c8c3f60-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c984d50-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9c984d50-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2f180a0a4cdfd8ca004036a8a421c7a2cddccac8 --- /dev/null +++ b/graph/incidents_graphml/9/9c984d50-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.43.4 + 100.64.43.4 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658541 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c984d50-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2.graphml b/graph/incidents_graphml/9/9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ea22735b7dd9ab27f906da05dd731c53b279f099 --- /dev/null +++ b/graph/incidents_graphml/9/9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.134.133 + USER-0015-2062.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","ASA Firewall"] + + + HOST + 100.64.91.47 + 100.64.91.47 + ["Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1720449023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2 + + + INCIDENT_LINK + 1720449023 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9c9dcb90-3d36-11ef-ba57-c3c14c21a8c2 + + + diff --git a/graph/incidents_graphml/9/9ca29f00-0c8d-11ef-a421-bb714b96b7ea.graphml b/graph/incidents_graphml/9/9ca29f00-0c8d-11ef-a421-bb714b96b7ea.graphml new file mode 100644 index 0000000000000000000000000000000000000000..360776125943a339b4e5100d2edaa4e2177fbf9f --- /dev/null +++ b/graph/incidents_graphml/9/9ca29f00-0c8d-11ef-a421-bb714b96b7ea.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.193 + 100.64.67.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715098783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca29f00-0c8d-11ef-a421-bb714b96b7ea + + + diff --git a/graph/incidents_graphml/9/9ca4c510-1173-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/9/9ca4c510-1173-11ef-98dd-db867c05f09b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..fd5ae1907d476e5ced55854d5f2ab5a4a60edd03 --- /dev/null +++ b/graph/incidents_graphml/9/9ca4c510-1173-11ef-98dd-db867c05f09b.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.20.181.243 + 172.20.181.243 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Windows Active Directory","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.97.50 + 100.64.97.50 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.89.33 + 100.64.89.33 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.91.138 + 100.64.91.138 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.4 + 100.64.87.4 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637371 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ca4c510-1173-11ef-98dd-db867c05f09b + + + diff --git a/graph/incidents_graphml/9/9ca5bad0-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9ca5bad0-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..088c72b8859bcc03b9dab4b08ad62a5af62a5084 --- /dev/null +++ b/graph/incidents_graphml/9/9ca5bad0-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.4 + 100.64.43.4 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658541 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ca5bad0-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9cbfcdd0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/9/9cbfcdd0-212f-11ef-98de-f5bd3e11f54f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4737b4c188ef0b3261f74318eb0c75a428f76687 --- /dev/null +++ b/graph/incidents_graphml/9/9cbfcdd0-212f-11ef-98de-f5bd3e11f54f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.32.159 + 100.64.32.159 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717367384 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cbfcdd0-212f-11ef-98de-f5bd3e11f54f + + + diff --git a/graph/incidents_graphml/9/9cd13790-70e6-11ee-adf7-3be9df66b766.graphml b/graph/incidents_graphml/9/9cd13790-70e6-11ee-adf7-3be9df66b766.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10ac3c443092e11e8a07a53f9eaf2d47d0b65a28 --- /dev/null +++ b/graph/incidents_graphml/9/9cd13790-70e6-11ee-adf7-3be9df66b766.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.246 + 100.64.28.246 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.6625 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"] + + + HOST + 100.64.11.114 + 100.64.11.114 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1697984627 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cd13790-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984627 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cd13790-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984627 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cd13790-70e6-11ee-adf7-3be9df66b766 + + + INCIDENT_LINK + 1697984627 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cd13790-70e6-11ee-adf7-3be9df66b766 + + + diff --git a/graph/incidents_graphml/9/9cd3cb00-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/9/9cd3cb00-212f-11ef-98de-f5bd3e11f54f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..771c23fd59ff985eeb759b9558554655dd4d9eba --- /dev/null +++ b/graph/incidents_graphml/9/9cd3cb00-212f-11ef-98de-f5bd3e11f54f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.13 + 100.64.16.13 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717367385 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9cd3cb00-212f-11ef-98de-f5bd3e11f54f + + + diff --git a/graph/incidents_graphml/9/9cd6ded0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9cd6ded0-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6990ee22ab90c4cb7cadacc76710b67eecf0cb4d --- /dev/null +++ b/graph/incidents_graphml/9/9cd6ded0-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.39.179 + 100.64.39.179 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274731 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9cd6ded0-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9ce231c0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/9ce231c0-2483-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..35e661872a9c1220439c8414f401166c5f12de5b --- /dev/null +++ b/graph/incidents_graphml/9/9ce231c0-2483-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,459 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.16 + 100.64.24.16 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.148 + 100.64.21.148 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.191 + 100.64.15.191 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.17 + 100.64.24.17 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.18 + 100.64.24.18 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.19 + 100.64.24.19 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.20 + 100.64.24.20 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.21 + 100.64.24.21 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.11.166 + 172.31.11.166 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.22 + 100.64.24.22 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.23 + 100.64.24.23 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.24 + 100.64.24.24 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ce231c0-2483-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/9/9ce249f0-212f-11ef-98de-f5bd3e11f54f.graphml b/graph/incidents_graphml/9/9ce249f0-212f-11ef-98de-f5bd3e11f54f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..987756282b6c0969cc3aa9cc8663da6661594695 --- /dev/null +++ b/graph/incidents_graphml/9/9ce249f0-212f-11ef-98de-f5bd3e11f54f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.16.13 + 100.64.16.13 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717367385 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ce249f0-212f-11ef-98de-f5bd3e11f54f + + + diff --git a/graph/incidents_graphml/9/9ce41580-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9ce41580-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a7f9089f54c59919d4cd4f03922d5686eedba41 --- /dev/null +++ b/graph/incidents_graphml/9/9ce41580-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.218 + 100.64.46.218 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146256 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ce41580-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/9/9ce69050-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ce69050-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9f7a81001a19d7b62d78209b938d73573cc09e66 --- /dev/null +++ b/graph/incidents_graphml/9/9ce69050-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.200 + 100.64.88.200 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139301 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9ce69050-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/9/9cef96f0-2ac7-11ee-a22a-2dc333e44cac.graphml b/graph/incidents_graphml/9/9cef96f0-2ac7-11ee-a22a-2dc333e44cac.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1cbce0be65a1573e3b95f2ca762febfacb3f1ad9 --- /dev/null +++ b/graph/incidents_graphml/9/9cef96f0-2ac7-11ee-a22a-2dc333e44cac.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.26.73.92 + 172.26.73.92 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.115 + 100.64.13.115 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690274731 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9cef96f0-2ac7-11ee-a22a-2dc333e44cac + + + diff --git a/graph/incidents_graphml/9/9cf47e10-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9cf47e10-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4bc2fca7c8c3b2cd2bd634a865674713ace75d2e --- /dev/null +++ b/graph/incidents_graphml/9/9cf47e10-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + USER-0015-1985.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.30.112 + 100.64.30.112 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695183020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9cf47e10-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/9/9cfa3590-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9cfa3590-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0e80c3d4b8ba358427444ae595c15ebb54c2a7a6 --- /dev/null +++ b/graph/incidents_graphml/9/9cfa3590-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.46.220 + USER-0015-1362.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146256 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9cfa3590-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/9/9cfa4da0-2483-11ef-9829-f7a898ee5380.graphml b/graph/incidents_graphml/9/9cfa4da0-2483-11ef-9829-f7a898ee5380.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ad895394b8a4edbc111491c841aba823dc36fbe8 --- /dev/null +++ b/graph/incidents_graphml/9/9cfa4da0-2483-11ef-9829-f7a898ee5380.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.34 + 100.64.24.34 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.35 + 100.64.24.35 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.60 + 100.64.4.60 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.36 + 100.64.24.36 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.153 + 100.64.9.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.37 + 100.64.24.37 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.195 + 100.64.6.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.38 + 100.64.24.38 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + INCIDENT_LINK + 1717733316 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9cfa4da0-2483-11ef-9829-f7a898ee5380 + + + diff --git a/graph/incidents_graphml/9/9d02eaa0-1173-11ef-98dd-db867c05f09b.graphml b/graph/incidents_graphml/9/9d02eaa0-1173-11ef-98dd-db867c05f09b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2653d6e6661976ff0f7a0678c629f3950ba35bbb --- /dev/null +++ b/graph/incidents_graphml/9/9d02eaa0-1173-11ef-98dd-db867c05f09b.graphml @@ -0,0 +1,329 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.97.51 + USER-0015-2166.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall","Barracuda WAF","Stealthwatch"] + + + HOST + 100.64.6.183 + 100.64.6.183 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.63.90 + 100.64.63.90 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.236 + USER-0015-2167.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.250 + 100.64.13.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.6.70 + 100.64.6.70 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.47.117 + USER-0015-2168.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.12.250 + 100.64.12.250 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + INCIDENT_LINK + 1715637372 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d02eaa0-1173-11ef-98dd-db867c05f09b + + + diff --git a/graph/incidents_graphml/9/9d0dace0-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9d0dace0-085b-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d839e5f9aaba63457e0a981256bd01670f300094 --- /dev/null +++ b/graph/incidents_graphml/9/9d0dace0-085b-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.198 + 100.64.14.198 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Stealthwatch"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714637504 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d0dace0-085b-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/9/9d0f6b40-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9d0f6b40-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e9333316f8854537ce018e05b9a4e7d3a888f80b --- /dev/null +++ b/graph/incidents_graphml/9/9d0f6b40-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.46.220 + USER-0015-1362.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146256 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d0f6b40-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/9/9d196430-9250-11ee-af25-efae5f68b6f3.graphml b/graph/incidents_graphml/9/9d196430-9250-11ee-af25-efae5f68b6f3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3cc7b1abb512f5e10bc36be59ffaa72cc539af63 --- /dev/null +++ b/graph/incidents_graphml/9/9d196430-9250-11ee-af25-efae5f68b6f3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.8.174 + 100.64.8.174 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1701658542 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d196430-9250-11ee-af25-efae5f68b6f3 + + + diff --git a/graph/incidents_graphml/9/9d1a7420-038e-11ee-8785-53111c12ea35.graphml b/graph/incidents_graphml/9/9d1a7420-038e-11ee-8785-53111c12ea35.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f733ca20fbcaa5263eeeb8df326b4540518c7297 --- /dev/null +++ b/graph/incidents_graphml/9/9d1a7420-038e-11ee-8785-53111c12ea35.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.82.177 + 100.64.82.177 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.75.181 + HOST-14580 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685962155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d1a7420-038e-11ee-8785-53111c12ea35 + + + INCIDENT_LINK + 1685962155 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d1a7420-038e-11ee-8785-53111c12ea35 + + + diff --git a/graph/incidents_graphml/9/9d1b85b0-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9d1b85b0-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42a4158aaea173561f07a0aa264e95d2e3a95f5b --- /dev/null +++ b/graph/incidents_graphml/9/9d1b85b0-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.146 + 100.64.81.146 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.73.82 + 100.64.73.82 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668613923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d1b85b0-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d1b85b0-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/9/9d1f0820-65c6-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9d1f0820-65c6-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5e35a5c514431dc0e21942a05832db76db56dece --- /dev/null +++ b/graph/incidents_graphml/9/9d1f0820-65c6-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.147 + 100.64.81.147 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.78.35 + 100.64.78.35 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668613923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d1f0820-65c6-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668613923 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d1f0820-65c6-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/9/9d1f3910-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9d1f3910-085b-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..16cb6fb7e08293abd02ab88a5437b488aac8d26b --- /dev/null +++ b/graph/incidents_graphml/9/9d1f3910-085b-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.198 + 100.64.14.198 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall","Stealthwatch"] + + + INCIDENT_LINK + 1714637504 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d1f3910-085b-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/9/9d265610-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/9d265610-2a11-11ee-ab73-f1f4f0adc079.graphml new file mode 100644 index 0000000000000000000000000000000000000000..341462736eac8df95fbe723a26613cfa0525dd8a --- /dev/null +++ b/graph/incidents_graphml/9/9d265610-2a11-11ee-ab73-f1f4f0adc079.graphml @@ -0,0 +1,653 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.115 + 100.64.82.115 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.123 + 100.64.72.123 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.71.114 + 100.64.71.114 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.116 + 100.64.82.116 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.70.255 + 100.64.70.255 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.73.89 + 100.64.73.89 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.117 + 100.64.82.117 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.118 + 100.64.82.118 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.23.69 + 100.64.23.69 + ["Exploiting Target","Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.11.36 + 100.64.11.36 + ["Exploiting Host"] + 0.578125 + ["Meraki","Precinct"] + + + HOST + 100.64.23.220 + 100.64.23.220 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.82.119 + 100.64.82.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.120 + 100.64.82.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.121 + 100.64.82.121 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.59.97 + 100.64.59.97 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.82.122 + 100.64.82.122 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.82.123 + 100.64.82.123 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196563 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d265610-2a11-11ee-ab73-f1f4f0adc079 + + + diff --git a/graph/incidents_graphml/9/9d302900-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9d302900-085b-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70ce8eb878bf21e60d177700a6bcf6a26d4b6101 --- /dev/null +++ b/graph/incidents_graphml/9/9d302900-085b-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.200 + 100.64.14.200 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714637504 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9d302900-085b-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/9/9d366230-2292-11ed-9939-5d8e6586807c.graphml b/graph/incidents_graphml/9/9d366230-2292-11ed-9939-5d8e6586807c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..037cf2e3a5b8e66c9c3e5165087db239a5409a01 --- /dev/null +++ b/graph/incidents_graphml/9/9d366230-2292-11ed-9939-5d8e6586807c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.210 + 100.64.84.210 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.151.220.246 + 10.151.220.246 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1661224861 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d366230-2292-11ed-9939-5d8e6586807c + + + diff --git a/graph/incidents_graphml/9/9d49ccd0-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/9/9d49ccd0-26aa-11ef-8ab8-f12e3827fb22.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e143aaefe5473fd52ead70a3d4d582ea37e43c9 --- /dev/null +++ b/graph/incidents_graphml/9/9d49ccd0-26aa-11ef-8ab8-f12e3827fb22.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.13.113 + 100.64.13.113 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717969969 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d49ccd0-26aa-11ef-8ab8-f12e3827fb22 + + + diff --git a/graph/incidents_graphml/9/9d4b2990-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9d4b2990-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6e2bb8a91af440377728e49d9a9a64ab71f0e82e --- /dev/null +++ b/graph/incidents_graphml/9/9d4b2990-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.136 + 100.64.15.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695183020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d4b2990-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/9/9d58c0f0-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/9/9d58c0f0-26aa-11ef-8ab8-f12e3827fb22.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3ddc168e6aaf16d925a66195c4aef8c44e7f76e5 --- /dev/null +++ b/graph/incidents_graphml/9/9d58c0f0-26aa-11ef-8ab8-f12e3827fb22.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.13.113 + 100.64.13.113 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717969969 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d58c0f0-26aa-11ef-8ab8-f12e3827fb22 + + + diff --git a/graph/incidents_graphml/9/9d59f6a0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9d59f6a0-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0889513912de946a0bc11d464019f7d7d67860df --- /dev/null +++ b/graph/incidents_graphml/9/9d59f6a0-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.15.136 + 100.64.15.136 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695183020 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9d59f6a0-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/9/9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8.graphml b/graph/incidents_graphml/9/9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..43fdd8a0afe22ddb54a41d27c0d0d2f7cb0bb22b --- /dev/null +++ b/graph/incidents_graphml/9/9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.61 + 100.64.84.61 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1666410605 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8 + + + INCIDENT_LINK + 1666410605 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d5a5d80-51bc-11ed-a1cd-0174b39dd6e8 + + + diff --git a/graph/incidents_graphml/9/9d6221d0-866f-11ee-8f03-878f88d78f03.graphml b/graph/incidents_graphml/9/9d6221d0-866f-11ee-8f03-878f88d78f03.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0a71aba3e67376a431e234f229eeed7185be83c0 --- /dev/null +++ b/graph/incidents_graphml/9/9d6221d0-866f-11ee-8f03-878f88d78f03.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.198 + 100.64.69.198 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.36.138 + USER-0015-1510.example.internal + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1700352443 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d6221d0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352443 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d6221d0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352443 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d6221d0-866f-11ee-8f03-878f88d78f03 + + + INCIDENT_LINK + 1700352443 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d6221d0-866f-11ee-8f03-878f88d78f03 + + + diff --git a/graph/incidents_graphml/9/9d634ce0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9d634ce0-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5d4caa65b00dd3afbc4e391da9473ab9df15f77 --- /dev/null +++ b/graph/incidents_graphml/9/9d634ce0-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.244 + 100.64.67.244 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171292 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d634ce0-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9d6c7ff0-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9d6c7ff0-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..3059e8263fdf7bc139577bf9f5cbcb7243f14b34 --- /dev/null +++ b/graph/incidents_graphml/9/9d6c7ff0-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,509 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.211 + 100.64.29.211 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.71.2 + 100.64.71.2 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.62.145 + 100.64.62.145 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.42.162 + 100.64.42.162 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.72.156 + 100.64.72.156 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.9.156 + 100.64.9.156 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.1.59 + 100.64.1.59 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.80.120 + 100.64.80.120 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.80.121 + 100.64.80.121 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.69.149 + 100.64.69.149 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.80.122 + 100.64.80.122 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.73.65 + 100.64.73.65 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.80.123 + 100.64.80.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.80.124 + 100.64.80.124 + ["Exploiting Target"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766305 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d6c7ff0-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/9/9d7219f0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9d7219f0-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..717a5cfc285f5cc5b0ee4181646268106eef651a --- /dev/null +++ b/graph/incidents_graphml/9/9d7219f0-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.244 + 100.64.67.244 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171293 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7219f0-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9d7317d0-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9d7317d0-6071-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c8c938589e04c6cc5a4158741dc3e52be097c8fd --- /dev/null +++ b/graph/incidents_graphml/9/9d7317d0-6071-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.1.28 + USER-0015-1750.example.internal + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + HOST + 100.64.77.75 + 100.64.77.75 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall"] + + + HOST + 100.64.77.76 + 100.64.77.76 + ["Exploiting Target"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.35.158 + 100.64.35.158 + ["Exploiting Host","Exploiting Target"] + 0.9634375 + ["Precinct","Meraki"] + + + HOST + 100.64.77.77 + 100.64.77.77 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027660 + malicious + 0.9634375 + 0.9634375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d7317d0-6071-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/9/9d737780-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9d737780-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..42abe632c54522c9cc3080dd61c2a7294b4410ce --- /dev/null +++ b/graph/incidents_graphml/9/9d737780-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,257 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.64.193 + 100.64.64.193 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.225 + 100.64.29.225 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.194 + 100.64.64.194 + ["Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.195 + 100.64.64.195 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.6.153 + 100.64.6.153 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d737780-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/9/9d7a5320-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9d7a5320-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c918ea490b2a2927a8f5e9a35d94a64608fec338 --- /dev/null +++ b/graph/incidents_graphml/9/9d7a5320-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.23.231 + 100.64.23.231 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d7a5320-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9d869770-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/9/9d869770-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf586825be554394b8b5a477fab87a5aa45a0df4 --- /dev/null +++ b/graph/incidents_graphml/9/9d869770-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703204 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d869770-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/9/9d88ad30-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9d88ad30-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1bdac972cca5b45020ca0eca6da91b9e94c73aa9 --- /dev/null +++ b/graph/incidents_graphml/9/9d88ad30-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,193 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.26.140 + 100.64.26.140 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.8.67 + 100.64.8.67 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.199 + 100.64.64.199 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.106 + 100.64.34.106 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d88ad30-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/9/9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e.graphml b/graph/incidents_graphml/9/9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7488f237eb277b42105296ce022de3e5033ab8da --- /dev/null +++ b/graph/incidents_graphml/9/9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.158 + 100.64.72.158 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.18.40 + 100.64.18.40 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.72.159 + 100.64.72.159 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1687961463 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961463 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961463 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e + + + INCIDENT_LINK + 1687961463 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d8ab6e0-15bd-11ee-aa1e-3bafa1120b8e + + + diff --git a/graph/incidents_graphml/9/9d928750-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9d928750-824a-11ed-9cff-b1e619d412bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..561296619a643e4e816b5310b7a9b1bf747efa99 --- /dev/null +++ b/graph/incidents_graphml/9/9d928750-824a-11ed-9cff-b1e619d412bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.117 + 100.64.87.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + USER-0015-1965.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1671749250 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9d928750-824a-11ed-9cff-b1e619d412bc + + + diff --git a/graph/incidents_graphml/9/9d968db0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9d968db0-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9a0a4fafa1bcf7c312b16c065a89d15b01334af7 --- /dev/null +++ b/graph/incidents_graphml/9/9d968db0-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.214.148 + 172.30.214.148 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.231 + 100.64.23.231 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315929 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d968db0-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9d981680-25e6-11ee-8760-d9b0ea984292.graphml b/graph/incidents_graphml/9/9d981680-25e6-11ee-8760-d9b0ea984292.graphml new file mode 100644 index 0000000000000000000000000000000000000000..25689f5804aa1b2cf719fbf7d4727990db0e54bc --- /dev/null +++ b/graph/incidents_graphml/9/9d981680-25e6-11ee-8760-d9b0ea984292.graphml @@ -0,0 +1,617 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.51.22 + 100.64.51.22 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.201 + 100.64.64.201 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.202 + 100.64.64.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.203 + 100.64.64.203 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.95 + 100.64.27.95 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.12 + 100.64.17.12 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.4.69 + 100.64.4.69 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.841796875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.204 + 100.64.64.204 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.59 + 100.64.27.59 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.121 + 100.64.18.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.17.98 + 100.64.17.98 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.205 + 100.64.64.205 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.64.206 + 100.64.64.206 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.171 + 100.64.14.171 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + INCIDENT_LINK + 1689738291 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9d981680-25e6-11ee-8760-d9b0ea984292 + + + diff --git a/graph/incidents_graphml/9/9d998c30-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9d998c30-824a-11ed-9cff-b1e619d412bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..90a0f5ed6db110ce93a01c6cad8be144a329a3d2 --- /dev/null +++ b/graph/incidents_graphml/9/9d998c30-824a-11ed-9cff-b1e619d412bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + USER-0015-1965.example.internal + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.117 + 100.64.87.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1671749250 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d998c30-824a-11ed-9cff-b1e619d412bc + + + diff --git a/graph/incidents_graphml/9/9d9ba610-1c7c-11ee-9c01-8b4657fad9e1.graphml b/graph/incidents_graphml/9/9d9ba610-1c7c-11ee-9c01-8b4657fad9e1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7fbdcc9dc9116865f11b7f7b014fb713db736e09 --- /dev/null +++ b/graph/incidents_graphml/9/9d9ba610-1c7c-11ee-9c01-8b4657fad9e1.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.232.220 + 172.16.232.220 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.21.180 + 100.64.21.180 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688703204 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d9ba610-1c7c-11ee-9c01-8b4657fad9e1 + + + diff --git a/graph/incidents_graphml/9/9d9c7d90-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9d9c7d90-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4a2c4b3aad992969bced14b36e270c30c3e8d9b9 --- /dev/null +++ b/graph/incidents_graphml/9/9d9c7d90-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.1 + 100.64.34.1 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087735 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9d9c7d90-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/9/9da156b0-8d5f-11ee-9951-411438339097.graphml b/graph/incidents_graphml/9/9da156b0-8d5f-11ee-9951-411438339097.graphml new file mode 100644 index 0000000000000000000000000000000000000000..66f37844d4f7c4098fc499abdac7a3ac969cd787 --- /dev/null +++ b/graph/incidents_graphml/9/9da156b0-8d5f-11ee-9951-411438339097.graphml @@ -0,0 +1,321 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.15 + 100.64.55.15 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.10 + 100.64.68.10 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.16 + 100.64.68.16 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.68.9 + 100.64.68.9 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + SERVICE + ["Exploited Service"] + 0.25 + ["Precinct"] + + + HOST + 100.64.68.17 + 100.64.68.17 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.18 + 100.64.68.18 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.22.18 + 100.64.22.18 + ["Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.19 + 100.64.68.19 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + INCIDENT_LINK + 1701115230 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Unprocessed + 9da156b0-8d5f-11ee-9951-411438339097 + + + diff --git a/graph/incidents_graphml/9/9da6f4b0-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9da6f4b0-2885-11ee-ab6d-398d68629c7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0b8bc944e4f819f4e5bf3b31f6f54e6b99bd9dd5 --- /dev/null +++ b/graph/incidents_graphml/9/9da6f4b0-2885-11ee-ab6d-398d68629c7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.85 + 100.64.48.85 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690026483 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9da6f4b0-2885-11ee-ab6d-398d68629c7b + + + diff --git a/graph/incidents_graphml/9/9db03fa0-0ebf-11ee-9392-932bfd273540.graphml b/graph/incidents_graphml/9/9db03fa0-0ebf-11ee-9392-932bfd273540.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d5c295d911374aa773cd6bdb843879a2bee077e3 --- /dev/null +++ b/graph/incidents_graphml/9/9db03fa0-0ebf-11ee-9392-932bfd273540.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.195 + 100.64.72.195 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.72.196 + 100.64.72.196 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1687192664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9db03fa0-0ebf-11ee-9392-932bfd273540 + + + INCIDENT_LINK + 1687192664 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9db03fa0-0ebf-11ee-9392-932bfd273540 + + + diff --git a/graph/incidents_graphml/9/9db909d0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9db909d0-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8c344daa29874c37452105403b7d89b9132d631f --- /dev/null +++ b/graph/incidents_graphml/9/9db909d0-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.27.131 + 100.64.27.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315929 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9db909d0-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9db9c990-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9db9c990-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0fffc2b1fea5e617c28a2fe95e2e5633443c363d --- /dev/null +++ b/graph/incidents_graphml/9/9db9c990-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.3 + 100.64.34.3 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087735 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9db9c990-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/9/9dc4c180-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9dc4c180-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10ed4e9830071ea58ca16032b8a51588e332c4f9 --- /dev/null +++ b/graph/incidents_graphml/9/9dc4c180-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696103 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9dc4c180-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9dd5ff90-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9dd5ff90-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..70908030a01b27a500e775e75649b1aeaa074c41 --- /dev/null +++ b/graph/incidents_graphml/9/9dd5ff90-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.133 + 100.64.33.133 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9dd5ff90-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9dd914f0-0fde-11ee-84f8-b581dff41d6b.graphml b/graph/incidents_graphml/9/9dd914f0-0fde-11ee-84f8-b581dff41d6b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1a199873950f4ebf951d7685ffbbd556054f3497 --- /dev/null +++ b/graph/incidents_graphml/9/9dd914f0-0fde-11ee-84f8-b581dff41d6b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.168.48 + 172.30.168.48 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.27.131 + 100.64.27.131 + ["Exploiting Host"] + 0.8875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687315930 + malicious + 0.8875 + 0.8875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9dd914f0-0fde-11ee-84f8-b581dff41d6b + + + diff --git a/graph/incidents_graphml/9/9ddf2d30-6606-11ee-962d-dd0cd806580f.graphml b/graph/incidents_graphml/9/9ddf2d30-6606-11ee-962d-dd0cd806580f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e915d845e802f98c9a6f2c6c9e3eaced96fe9673 --- /dev/null +++ b/graph/incidents_graphml/9/9ddf2d30-6606-11ee-962d-dd0cd806580f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.168.229 + 172.23.168.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.35.200 + 100.64.35.200 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696788910 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ddf2d30-6606-11ee-962d-dd0cd806580f + + + diff --git a/graph/incidents_graphml/9/9de65340-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9de65340-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..889c0be32fc34ba77e82f2fcb3e29ed8902ec30e --- /dev/null +++ b/graph/incidents_graphml/9/9de65340-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,85 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.42.123 + 100.64.42.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.96.192 + 172.18.96.192 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9de65340-49e5-11ee-adbc-ad3007b13df0 + + + INCIDENT_LINK + 1693696104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9de65340-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9df56e70-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9df56e70-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7ccdbd79dc93a2ec9a358c9b3a588c1bda7d7af8 --- /dev/null +++ b/graph/incidents_graphml/9/9df56e70-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.42.123 + 100.64.42.123 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9df56e70-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9dfd3b80-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9dfd3b80-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..65e25826e4f8840b04bca0d71a97af442bed7487 --- /dev/null +++ b/graph/incidents_graphml/9/9dfd3b80-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 100.64.86.69 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF","Windows Active Directory"] + + + HOST + 100.64.90.3 + 100.64.90.3 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695183021 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9dfd3b80-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/9/9e059b10-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e059b10-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4353efc0fc30ee119078f68326abcdb52496386f --- /dev/null +++ b/graph/incidents_graphml/9/9e059b10-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.40.123 + 100.64.40.123 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e059b10-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9e09e5b0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9e09e5b0-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..44ee3e4cd99eb261f1c07fec4eb795e485da5583 --- /dev/null +++ b/graph/incidents_graphml/9/9e09e5b0-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.63 + 100.64.40.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1695183022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e09e5b0-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/9/9e1356b0-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e1356b0-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a6088997bb4363273641aa911ce381e6587d5fce --- /dev/null +++ b/graph/incidents_graphml/9/9e1356b0-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.140 + 100.64.37.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e1356b0-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9e165850-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9e165850-2885-11ee-ab6d-398d68629c7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7cbbfea1f6dd47bc820f3f10e2a8462c9785d5a0 --- /dev/null +++ b/graph/incidents_graphml/9/9e165850-2885-11ee-ab6d-398d68629c7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.87 + 100.64.48.87 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690026484 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e165850-2885-11ee-ab6d-398d68629c7b + + + diff --git a/graph/incidents_graphml/9/9e18d9d0-576b-11ee-b369-595b8ff2e388.graphml b/graph/incidents_graphml/9/9e18d9d0-576b-11ee-b369-595b8ff2e388.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1e1fe3e4ae7daf4656a8d665ea88c3979e037764 --- /dev/null +++ b/graph/incidents_graphml/9/9e18d9d0-576b-11ee-b369-595b8ff2e388.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.221.82.8 + 10.221.82.8 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.40.63 + 100.64.40.63 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695183022 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9e18d9d0-576b-11ee-b369-595b8ff2e388 + + + diff --git a/graph/incidents_graphml/9/9e1ce4f0-3a81-11ee-b55b-6596b150fac1.graphml b/graph/incidents_graphml/9/9e1ce4f0-3a81-11ee-b55b-6596b150fac1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..69c0af06c02f9af1dfbb853c3798cf1e494ddd95 --- /dev/null +++ b/graph/incidents_graphml/9/9e1ce4f0-3a81-11ee-b55b-6596b150fac1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.12.95 + 100.64.12.95 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.43 + 100.64.68.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","ProofPoint Protect"] + + + INCIDENT_LINK + 1692003887 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e1ce4f0-3a81-11ee-b55b-6596b150fac1 + + + INCIDENT_LINK + 1692003887 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e1ce4f0-3a81-11ee-b55b-6596b150fac1 + + + diff --git a/graph/incidents_graphml/9/9e1d89a0-6a83-11ee-8b64-8bde2abad778.graphml b/graph/incidents_graphml/9/9e1d89a0-6a83-11ee-8b64-8bde2abad778.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e5b1804e242f71dd3a9a0c66cb4e49feb97c7ea --- /dev/null +++ b/graph/incidents_graphml/9/9e1d89a0-6a83-11ee-8b64-8bde2abad778.graphml @@ -0,0 +1,409 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.201.119 + 172.30.201.119 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.44 + 100.64.20.44 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.237 + 100.64.43.237 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.238 + 100.64.43.238 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.180 + 100.64.11.180 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.239 + 100.64.43.239 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.240 + 100.64.43.240 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.99 + 100.64.10.99 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.241 + 100.64.43.241 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.30.214 + 100.64.30.214 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.154 + 100.64.11.154 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + INCIDENT_LINK + 1697282402 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e1d89a0-6a83-11ee-8b64-8bde2abad778 + + + diff --git a/graph/incidents_graphml/9/9e216070-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e216070-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a80761cbf7674033b7d6ead9be6c1e06a25a76f7 --- /dev/null +++ b/graph/incidents_graphml/9/9e216070-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.117.12.163 + 10.117.12.163 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.140 + 100.64.37.140 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9e216070-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9e218d50-72a6-11ed-85ba-bb75aa2d6818.graphml b/graph/incidents_graphml/9/9e218d50-72a6-11ed-85ba-bb75aa2d6818.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1374c022b4e5ed10f74e06d7e6298cbd55caef8f --- /dev/null +++ b/graph/incidents_graphml/9/9e218d50-72a6-11ed-85ba-bb75aa2d6818.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.70.233 + 100.64.70.233 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.70.234 + 100.64.70.234 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella"] + + + INCIDENT_LINK + 1670029546 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e218d50-72a6-11ed-85ba-bb75aa2d6818 + + + diff --git a/graph/incidents_graphml/9/9e32bef0-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9e32bef0-824a-11ed-9cff-b1e619d412bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0c50e6455b4ba4aaf64cb977fb18571bef0d0553 --- /dev/null +++ b/graph/incidents_graphml/9/9e32bef0-824a-11ed-9cff-b1e619d412bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.87.119 + 100.64.87.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1671749251 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e32bef0-824a-11ed-9cff-b1e619d412bc + + + diff --git a/graph/incidents_graphml/9/9e386440-824a-11ed-9cff-b1e619d412bc.graphml b/graph/incidents_graphml/9/9e386440-824a-11ed-9cff-b1e619d412bc.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a92bd92dd538f8b05ba26d1aae1157344eb70fdf --- /dev/null +++ b/graph/incidents_graphml/9/9e386440-824a-11ed-9cff-b1e619d412bc.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.87.119 + 100.64.87.119 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1671749251 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e386440-824a-11ed-9cff-b1e619d412bc + + + diff --git a/graph/incidents_graphml/9/9e3f3d10-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9e3f3d10-2885-11ee-ab6d-398d68629c7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2a7685e043a3d6d54b3e43f82f11f675d7d7344e --- /dev/null +++ b/graph/incidents_graphml/9/9e3f3d10-2885-11ee-ab6d-398d68629c7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.87 + 100.64.48.87 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690026484 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e3f3d10-2885-11ee-ab6d-398d68629c7b + + + diff --git a/graph/incidents_graphml/9/9e484c20-5909-11ee-9e4b-6beca2c0696d.graphml b/graph/incidents_graphml/9/9e484c20-5909-11ee-9e4b-6beca2c0696d.graphml new file mode 100644 index 0000000000000000000000000000000000000000..18f97c16229bfad4e7a3d83cbcf054fc8ca56bf9 --- /dev/null +++ b/graph/incidents_graphml/9/9e484c20-5909-11ee-9e4b-6beca2c0696d.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.56.57 + 100.64.56.57 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695360834 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e484c20-5909-11ee-9e4b-6beca2c0696d + + + diff --git a/graph/incidents_graphml/9/9e4e7030-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9e4e7030-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bd1a3b20cfec37a599811b6f5d6a8a83e914fde4 --- /dev/null +++ b/graph/incidents_graphml/9/9e4e7030-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.246 + 100.64.67.246 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171294 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e4e7030-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9e547480-e50b-11ee-9817-3f0d09cf653c.graphml b/graph/incidents_graphml/9/9e547480-e50b-11ee-9817-3f0d09cf653c.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7c9d487d397651303287e40de5d19eba61dc00ae --- /dev/null +++ b/graph/incidents_graphml/9/9e547480-e50b-11ee-9817-3f0d09cf653c.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.16 + 100.64.69.16 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.40 + 100.64.68.40 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","PAN NGFW","CASB","Protect"] + + + INCIDENT_LINK + 1710754855 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e547480-e50b-11ee-9817-3f0d09cf653c + + + diff --git a/graph/incidents_graphml/9/9e550de0-9f48-11ee-b79d-9f7e35646416.graphml b/graph/incidents_graphml/9/9e550de0-9f48-11ee-b79d-9f7e35646416.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f1b1c990020c82cfe861e8a6d5a851f968cad3c7 --- /dev/null +++ b/graph/incidents_graphml/9/9e550de0-9f48-11ee-b79d-9f7e35646416.graphml @@ -0,0 +1,133 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.69.13 + 100.64.69.13 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB","Azure Security"] + + + SERVICE + ["Exploited Service"] + 0.325 + ["Precinct"] + + + HOST + 100.64.69.14 + 100.64.69.14 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1703084473 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 9e550de0-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084473 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 9e550de0-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084473 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 9e550de0-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084473 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 9e550de0-9f48-11ee-b79d-9f7e35646416 + + + INCIDENT_LINK + 1703084473 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target","Exploited Service"] + complete-mission + Disrupted + 9e550de0-9f48-11ee-b79d-9f7e35646416 + + + diff --git a/graph/incidents_graphml/9/9e5d8b60-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9e5d8b60-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26230afbbd4356c0b25191c660e1b6dc923f868d --- /dev/null +++ b/graph/incidents_graphml/9/9e5d8b60-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.246 + 100.64.67.246 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171294 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e5d8b60-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9e5e9080-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e5e9080-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9599baf79e0c0221b1dd1bbd71e3b30349da6b42 --- /dev/null +++ b/graph/incidents_graphml/9/9e5e9080-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696104 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e5e9080-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9e6a72f0-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9e6a72f0-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5bafe3e86793703068e3ed688b9b6d8f35a4dd76 --- /dev/null +++ b/graph/incidents_graphml/9/9e6a72f0-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.246 + 100.64.52.246 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398692 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e6a72f0-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/9e7302e0-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9e7302e0-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5552687634bb2f9eec59892f8ccf30c7e1bcb8e4 --- /dev/null +++ b/graph/incidents_graphml/9/9e7302e0-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.37.88 + 100.64.37.88 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696105 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e7302e0-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9e81a9d0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/9/9e81a9d0-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8dd0d33d41f9bf3291c6676e08489b9f6b3c6b04 --- /dev/null +++ b/graph/incidents_graphml/9/9e81a9d0-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.72.102 + 100.64.72.102 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.103 + 100.64.72.103 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.6.121 + 100.64.6.121 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480594 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e81a9d0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480594 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e81a9d0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480594 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e81a9d0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480594 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e81a9d0-238e-11ee-8f53-17c8a7373bd3 + + + diff --git a/graph/incidents_graphml/9/9e891e80-19b7-11ee-af67-f75f54b1c1f9.graphml b/graph/incidents_graphml/9/9e891e80-19b7-11ee-af67-f75f54b1c1f9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..33c6fd73316fda7d26b597a9ac6727f7c65fa235 --- /dev/null +++ b/graph/incidents_graphml/9/9e891e80-19b7-11ee-af67-f75f54b1c1f9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.246 + 100.64.52.246 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688398692 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9e891e80-19b7-11ee-af67-f75f54b1c1f9 + + + diff --git a/graph/incidents_graphml/9/9e9b2700-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9e9b2700-9947-11ee-986d-1bbc30865dce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2e45e712ea03596de1727b20831136734630f0ae --- /dev/null +++ b/graph/incidents_graphml/9/9e9b2700-9947-11ee-986d-1bbc30865dce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.247 + 100.64.43.247 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702424337 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9e9b2700-9947-11ee-986d-1bbc30865dce + + + diff --git a/graph/incidents_graphml/9/9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf.graphml b/graph/incidents_graphml/9/9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1c69f9aff07467c6ed7c901163d0df3295942fc7 --- /dev/null +++ b/graph/incidents_graphml/9/9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf.graphml @@ -0,0 +1,185 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.243 + 100.64.40.243 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.184.211.180 + 10.184.211.180 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Windows Active Directory","Barracuda WAF","ASA Firewall","SentinelOne"] + + + HOST + 100.64.4.110 + 100.64.4.110 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.28.235 + 100.64.28.235 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.94.149 + 100.64.94.149 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + INCIDENT_LINK + 1714983251 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9e9c0840-0b80-11ef-b87c-0d8b17cd9fbf + + + diff --git a/graph/incidents_graphml/9/9e9e9f80-6071-11ed-81d5-3f5b5a73c539.graphml b/graph/incidents_graphml/9/9e9e9f80-6071-11ed-81d5-3f5b5a73c539.graphml new file mode 100644 index 0000000000000000000000000000000000000000..27581ef01b9ab92fb5c80d596baf57c541c06fcf --- /dev/null +++ b/graph/incidents_graphml/9/9e9e9f80-6071-11ed-81d5-3f5b5a73c539.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.77.78 + 100.64.77.78 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.72.135 + 100.64.72.135 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall"] + + + INCIDENT_LINK + 1668027662 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e9e9f80-6071-11ed-81d5-3f5b5a73c539 + + + INCIDENT_LINK + 1668027662 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9e9e9f80-6071-11ed-81d5-3f5b5a73c539 + + + diff --git a/graph/incidents_graphml/9/9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5.graphml b/graph/incidents_graphml/9/9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5cdaa995d4e2de5e821ac4bf4c53ea932a38779 --- /dev/null +++ b/graph/incidents_graphml/9/9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5.graphml @@ -0,0 +1,445 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.37.183 + 100.64.37.183 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.65 + 100.64.68.65 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB"] + + + HOST + 100.64.11.129 + 100.64.11.129 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.36 + 100.64.68.36 + ["Exploiting Target","Exploiting Host"] + 0.6625 + ["Precinct","PAN NGFW","ProofPoint CASB","ProofPoint Protect"] + + + HOST + 100.64.12.88 + 100.64.12.88 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.12 + 100.64.68.12 + ["Exploiting Target","Exploiting Host"] + 0.81015625 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.70.181 + 100.64.70.181 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.26 + 100.64.68.26 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW","Okta","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.11.151 + 100.64.11.151 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.34.111 + 100.64.34.111 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.136 + 100.64.12.136 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.14.189 + 100.64.14.189 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.58.41 + 100.64.58.41 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + INCIDENT_LINK + 1696094415 + malicious + 0.81015625 + 0.81015625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9eba1aa0-5fb5-11ee-b97f-4dc8d9506ef5 + + + diff --git a/graph/incidents_graphml/9/9ebee230-614d-11ee-82b9-21d9d71c2fa4.graphml b/graph/incidents_graphml/9/9ebee230-614d-11ee-82b9-21d9d71c2fa4.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2cd0b4342a26270923d72ddec0a2dcfef6b8d50f --- /dev/null +++ b/graph/incidents_graphml/9/9ebee230-614d-11ee-82b9-21d9d71c2fa4.graphml @@ -0,0 +1,135 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.238 + 100.64.36.238 + ["Exploiting Host"] + 0.49375 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.68.45 + 100.64.68.45 + ["Exploiting Target","Exploiting Host"] + 0.746875 + ["Precinct","PAN NGFW","ProofPoint Protect","ProofPoint CASB"] + + + HOST + 100.64.37.76 + 100.64.37.76 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + HOST + 100.64.12.136 + 100.64.12.136 + ["Exploiting Host","Exploiting Target"] + 0.746875 + ["Precinct","PAN NGFW"] + + + INCIDENT_LINK + 1696269649 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ebee230-614d-11ee-82b9-21d9d71c2fa4 + + + INCIDENT_LINK + 1696269649 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ebee230-614d-11ee-82b9-21d9d71c2fa4 + + + INCIDENT_LINK + 1696269649 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ebee230-614d-11ee-82b9-21d9d71c2fa4 + + + INCIDENT_LINK + 1696269649 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ebee230-614d-11ee-82b9-21d9d71c2fa4 + + + INCIDENT_LINK + 1696269649 + malicious + 0.746875 + 0.746875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ebee230-614d-11ee-82b9-21d9d71c2fa4 + + + diff --git a/graph/incidents_graphml/9/9ecae6e0-49e5-11ee-adbc-ad3007b13df0.graphml b/graph/incidents_graphml/9/9ecae6e0-49e5-11ee-adbc-ad3007b13df0.graphml new file mode 100644 index 0000000000000000000000000000000000000000..12132fbd369732a2dad33c5ab9fc536dc7063ae8 --- /dev/null +++ b/graph/incidents_graphml/9/9ecae6e0-49e5-11ee-adbc-ad3007b13df0.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.33.154 + 100.64.33.154 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1693696105 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ecae6e0-49e5-11ee-adbc-ad3007b13df0 + + + diff --git a/graph/incidents_graphml/9/9ecf9260-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9ecf9260-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..0ffcc58ffe0a49170741bfa8537a693ce6b00036 --- /dev/null +++ b/graph/incidents_graphml/9/9ecf9260-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.16.187 + 100.64.16.187 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki","Umbrella","Stealthwatch"] + + + HOST + 100.64.74.13 + 100.64.74.13 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella","Stealthwatch"] + + + INCIDENT_LINK + 1685766307 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ecf9260-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766307 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9ecf9260-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/9/9ed858f0-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9ed858f0-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f30ae429491c27ed6255be660b5e81f2acc28295 --- /dev/null +++ b/graph/incidents_graphml/9/9ed858f0-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087737 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ed858f0-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/9/9ed872e0-2a11-11ee-ab73-f1f4f0adc079.graphml b/graph/incidents_graphml/9/9ed872e0-2a11-11ee-ab73-f1f4f0adc079.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6a6c02b9471880bf6901563ec0695f9c0f5ac2dc --- /dev/null +++ b/graph/incidents_graphml/9/9ed872e0-2a11-11ee-ab73-f1f4f0adc079.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.140.46.52 + 10.140.46.52 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki"] + + + HOST + 100.64.82.124 + 100.64.82.124 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1690196566 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ed872e0-2a11-11ee-ab73-f1f4f0adc079 + + + INCIDENT_LINK + 1690196566 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ed872e0-2a11-11ee-ab73-f1f4f0adc079 + + + diff --git a/graph/incidents_graphml/9/9eda8b10-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9eda8b10-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..15e2adfd88a992ee02f4cbe44be97abc89e4253d --- /dev/null +++ b/graph/incidents_graphml/9/9eda8b10-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780418 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9eda8b10-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/9/9eec00f0-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/9eec00f0-ffe3-11ee-b8be-512e5047d566.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e689c950cc5eab933b35055a5412528b1e432c87 --- /dev/null +++ b/graph/incidents_graphml/9/9eec00f0-ffe3-11ee-b8be-512e5047d566.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.65.167 + USER-0015-1467.example.internal + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713706358 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9eec00f0-ffe3-11ee-b8be-512e5047d566 + + + diff --git a/graph/incidents_graphml/9/9eee3a20-4191-11ee-b8b0-0f1db008ec38.graphml b/graph/incidents_graphml/9/9eee3a20-4191-11ee-b8b0-0f1db008ec38.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8483697b198563bf5f138f7a40bce2049b3032e5 --- /dev/null +++ b/graph/incidents_graphml/9/9eee3a20-4191-11ee-b8b0-0f1db008ec38.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.229.11 + 172.30.229.11 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.18.117 + 100.64.18.117 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692780418 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9eee3a20-4191-11ee-b8b0-0f1db008ec38 + + + diff --git a/graph/incidents_graphml/9/9ef12420-01c6-11ee-b478-9b612300fc52.graphml b/graph/incidents_graphml/9/9ef12420-01c6-11ee-b478-9b612300fc52.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7714ba96bc633ef25411bcb122ce82061475f356 --- /dev/null +++ b/graph/incidents_graphml/9/9ef12420-01c6-11ee-b478-9b612300fc52.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.41.168 + 100.64.41.168 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.10.116 + 100.64.10.116 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685766307 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ef12420-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766307 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ef12420-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766307 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ef12420-01c6-11ee-b478-9b612300fc52 + + + INCIDENT_LINK + 1685766307 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ef12420-01c6-11ee-b478-9b612300fc52 + + + diff --git a/graph/incidents_graphml/9/9efca9d0-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9efca9d0-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..10d2941b778da7f8b77aa568fbcc3c79d342445a --- /dev/null +++ b/graph/incidents_graphml/9/9efca9d0-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.34.5 + 100.64.34.5 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087737 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9efca9d0-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/9/9efe5070-ffe3-11ee-b8be-512e5047d566.graphml b/graph/incidents_graphml/9/9efe5070-ffe3-11ee-b8be-512e5047d566.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8f40433c67e30c5fc9121e751afc1ef7e1b2dc7e --- /dev/null +++ b/graph/incidents_graphml/9/9efe5070-ffe3-11ee-b8be-512e5047d566.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.65.167 + USER-0015-1467.example.internal + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1713706358 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9efe5070-ffe3-11ee-b8be-512e5047d566 + + + diff --git a/graph/incidents_graphml/9/9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b5daf9a08a1620ce2dce845dfba36dc6cda1688c --- /dev/null +++ b/graph/incidents_graphml/9/9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.19.32 + 100.64.19.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695978451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f0ca720-5ea7-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/9/9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml b/graph/incidents_graphml/9/9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml new file mode 100644 index 0000000000000000000000000000000000000000..41ef8eb4662d780f71492c847e8230f85463bfd2 --- /dev/null +++ b/graph/incidents_graphml/9/9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.174.172 + 172.30.174.172 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.19.32 + 100.64.19.32 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1695978451 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9f1cfad0-5ea7-11ee-b8f7-eb6c1fc8ba02 + + + diff --git a/graph/incidents_graphml/9/9f20d1c0-9947-11ee-986d-1bbc30865dce.graphml b/graph/incidents_graphml/9/9f20d1c0-9947-11ee-986d-1bbc30865dce.graphml new file mode 100644 index 0000000000000000000000000000000000000000..2d4010a6d030124ecb73c3e3dee290bb52a88461 --- /dev/null +++ b/graph/incidents_graphml/9/9f20d1c0-9947-11ee-986d-1bbc30865dce.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.43.249 + 100.64.43.249 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1702424338 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9f20d1c0-9947-11ee-986d-1bbc30865dce + + + diff --git a/graph/incidents_graphml/9/9f29d770-26aa-11ef-8ab8-f12e3827fb22.graphml b/graph/incidents_graphml/9/9f29d770-26aa-11ef-8ab8-f12e3827fb22.graphml new file mode 100644 index 0000000000000000000000000000000000000000..56ed070c5d054d63ba1ee9e3d23cd7557f76033a --- /dev/null +++ b/graph/incidents_graphml/9/9f29d770-26aa-11ef-8ab8-f12e3827fb22.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.45.22 + 100.64.45.22 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717969972 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f29d770-26aa-11ef-8ab8-f12e3827fb22 + + + diff --git a/graph/incidents_graphml/9/9f313030-020f-11ee-be0c-f125b7f6022a.graphml b/graph/incidents_graphml/9/9f313030-020f-11ee-be0c-f125b7f6022a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..26ff706bf0e60d9a303d03617402e7c383b5f85a --- /dev/null +++ b/graph/incidents_graphml/9/9f313030-020f-11ee-be0c-f125b7f6022a.graphml @@ -0,0 +1,509 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.30.74 + 100.64.30.74 + ["Exploiting Host"] + 0.68359375 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.74.72 + 100.64.74.72 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.74.73 + 100.64.74.73 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.72.73 + USER-0015-1672.example.internal + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Umbrella","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.72.177 + 100.64.72.177 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.74.74 + 100.64.74.74 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.30.215 + 100.64.30.215 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.74.75 + 100.64.74.75 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki","Stealthwatch"] + + + HOST + 100.64.71.238 + 100.64.71.238 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.68.223 + 100.64.68.223 + ["Exploiting Host","Exploiting Target"] + 0.841796875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.74.76 + 100.64.74.76 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.71.147 + 100.64.71.147 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki","Cisco Meraki Firewall","Umbrella","Stealthwatch"] + + + HOST + 100.64.48.93 + 100.64.48.93 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Cisco Meraki Firewall","Stealthwatch"] + + + HOST + 100.64.74.77 + 100.64.74.77 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki","Stealthwatch"] + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + INCIDENT_LINK + 1685797661 + malicious + 0.841796875 + 0.841796875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f313030-020f-11ee-be0c-f125b7f6022a + + + diff --git a/graph/incidents_graphml/9/9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml b/graph/incidents_graphml/9/9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml new file mode 100644 index 0000000000000000000000000000000000000000..ff3c6ada29c1f8f4dffa14b42aa12cc8d3cc119d --- /dev/null +++ b/graph/incidents_graphml/9/9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.191 + 100.64.9.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1708860347 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9f3c6de0-d3d0-11ee-a6e5-2b3ad02f17a7 + + + diff --git a/graph/incidents_graphml/9/9f3ee380-f7ee-11ee-af87-d52023252f4a.graphml b/graph/incidents_graphml/9/9f3ee380-f7ee-11ee-af87-d52023252f4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bdd7d1445e285ffd69ba99c997f0d72a70fcdaed --- /dev/null +++ b/graph/incidents_graphml/9/9f3ee380-f7ee-11ee-af87-d52023252f4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.52.124 + 100.64.52.124 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712831474 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f3ee380-f7ee-11ee-af87-d52023252f4a + + + diff --git a/graph/incidents_graphml/9/9f41b490-df82-11ee-8f11-296badf765d8.graphml b/graph/incidents_graphml/9/9f41b490-df82-11ee-8f11-296badf765d8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7614a82a01bcf0dfbe499610c25912fe6a3f55de --- /dev/null +++ b/graph/incidents_graphml/9/9f41b490-df82-11ee-8f11-296badf765d8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.21.46 + 100.64.21.46 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.40.149 + 172.29.40.149 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1710146260 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f41b490-df82-11ee-8f11-296badf765d8 + + + diff --git a/graph/incidents_graphml/9/9f4dd790-85f3-11ee-b40b-bf8e12a3a664.graphml b/graph/incidents_graphml/9/9f4dd790-85f3-11ee-b40b-bf8e12a3a664.graphml new file mode 100644 index 0000000000000000000000000000000000000000..23d1c331643af0df1bafb9f559a9b260864b86af --- /dev/null +++ b/graph/incidents_graphml/9/9f4dd790-85f3-11ee-b40b-bf8e12a3a664.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.248 + 100.64.7.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700299189 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9f4dd790-85f3-11ee-b40b-bf8e12a3a664 + + + diff --git a/graph/incidents_graphml/9/9f566320-f7ee-11ee-af87-d52023252f4a.graphml b/graph/incidents_graphml/9/9f566320-f7ee-11ee-af87-d52023252f4a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f72a6a6103a8dd32d7ca04c9a71a816d1abd371b --- /dev/null +++ b/graph/incidents_graphml/9/9f566320-f7ee-11ee-af87-d52023252f4a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.52.124 + 100.64.52.124 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1712831474 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9f566320-f7ee-11ee-af87-d52023252f4a + + + diff --git a/graph/incidents_graphml/9/9f5c5c60-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f5c5c60-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..5425309d5ae1fe55b5e7bb6bd26ec7629cd573ce --- /dev/null +++ b/graph/incidents_graphml/9/9f5c5c60-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.9 + 100.64.55.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170769 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f5c5c60-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9f699e40-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9f699e40-085b-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d41aceaf33f80be6f934e9847d9c27a0b0cdfb74 --- /dev/null +++ b/graph/incidents_graphml/9/9f699e40-085b-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.14.202 + 100.64.14.202 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714637508 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f699e40-085b-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/9/9f6ae2e0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9f6ae2e0-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..e80be28362c2992842d2678f329e2393c1612e0d --- /dev/null +++ b/graph/incidents_graphml/9/9f6ae2e0-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.179 + 100.64.15.179 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9f6ae2e0-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/9/9f6c4230-a2d5-11ee-8541-6f03abc6c851.graphml b/graph/incidents_graphml/9/9f6c4230-a2d5-11ee-8541-6f03abc6c851.graphml new file mode 100644 index 0000000000000000000000000000000000000000..4d7764773264010623226f4ab10ca1c02b6e603c --- /dev/null +++ b/graph/incidents_graphml/9/9f6c4230-a2d5-11ee-8541-6f03abc6c851.graphml @@ -0,0 +1,503 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.129 + 100.64.29.129 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.130 + USER-0015-1280.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.131 + 100.64.29.131 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 192.0.2.58 + 192.0.2.58 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.132 + 100.64.29.132 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.47 + 100.64.10.47 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.133 + 100.64.29.133 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.134 + 100.64.29.134 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.78.41 + 172.31.78.41 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.20.102 + 100.64.20.102 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.135 + 100.64.29.135 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.136 + 100.64.29.136 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.137 + 100.64.29.137 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.138 + 100.64.29.138 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + INCIDENT_LINK + 1703474888 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c4230-a2d5-11ee-8541-6f03abc6c851 + + + diff --git a/graph/incidents_graphml/9/9f6c8820-ee05-11ec-963b-2fbb8aeb8168.graphml b/graph/incidents_graphml/9/9f6c8820-ee05-11ec-963b-2fbb8aeb8168.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f09f590681df9dd40b9f0ab322fa220d8c687461 --- /dev/null +++ b/graph/incidents_graphml/9/9f6c8820-ee05-11ec-963b-2fbb8aeb8168.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.73.220 + 100.64.73.220 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.1.166 + USER-0015-1615.example.internal + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655446845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c8820-ee05-11ec-963b-2fbb8aeb8168 + + + INCIDENT_LINK + 1655446845 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f6c8820-ee05-11ec-963b-2fbb8aeb8168 + + + diff --git a/graph/incidents_graphml/9/9f6cfe30-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f6cfe30-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f4b53aa5d2049f6ebcdffee3e5ab90b2ad78c78f --- /dev/null +++ b/graph/incidents_graphml/9/9f6cfe30-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.55.9 + 100.64.55.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170769 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9f6cfe30-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9f72d030-117d-11ee-b107-2764325d5a51.graphml b/graph/incidents_graphml/9/9f72d030-117d-11ee-b107-2764325d5a51.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f06755bd6ff00bb506a0d96a13eb3fe1d38c519b --- /dev/null +++ b/graph/incidents_graphml/9/9f72d030-117d-11ee-b107-2764325d5a51.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.36.164 + USER-0015-1441.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1687494173 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f72d030-117d-11ee-b107-2764325d5a51 + + + INCIDENT_LINK + 1687494173 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f72d030-117d-11ee-b107-2764325d5a51 + + + diff --git a/graph/incidents_graphml/9/9f7a4010-085b-11ef-bd54-61e579a3d29b.graphml b/graph/incidents_graphml/9/9f7a4010-085b-11ef-bd54-61e579a3d29b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ae819014549faf1c7795a5c62dcc0951cf04ed8 --- /dev/null +++ b/graph/incidents_graphml/9/9f7a4010-085b-11ef-bd54-61e579a3d29b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.29.1.127 + 172.29.1.127 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.14.202 + 100.64.14.202 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1714637508 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9f7a4010-085b-11ef-bd54-61e579a3d29b + + + diff --git a/graph/incidents_graphml/9/9f7aca80-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/9/9f7aca80-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e7effa50b440f4da503b81beb31e94fbd02834c --- /dev/null +++ b/graph/incidents_graphml/9/9f7aca80-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.9.205 + 100.64.9.205 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458297 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f7aca80-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/9/9f7bcb40-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f7bcb40-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..54e4bceb085463f61d5ca10821208117817c9ab6 --- /dev/null +++ b/graph/incidents_graphml/9/9f7bcb40-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.9 + 100.64.55.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170769 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f7bcb40-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9f7ed9e0-6068-11ee-9912-3b4bbb38327a.graphml b/graph/incidents_graphml/9/9f7ed9e0-6068-11ee-9912-3b4bbb38327a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..1ae5d2f611b9330d80b4fee7c7ccc66f38f2918c --- /dev/null +++ b/graph/incidents_graphml/9/9f7ed9e0-6068-11ee-9912-3b4bbb38327a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.248 + 100.64.67.248 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1696171296 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f7ed9e0-6068-11ee-9912-3b4bbb38327a + + + diff --git a/graph/incidents_graphml/9/9f7f9d40-2e77-11ed-9a52-4b27bf417805.graphml b/graph/incidents_graphml/9/9f7f9d40-2e77-11ed-9a52-4b27bf417805.graphml new file mode 100644 index 0000000000000000000000000000000000000000..116e7b3b115617ed12fbe4499ff9b0b0950d3e8e --- /dev/null +++ b/graph/incidents_graphml/9/9f7f9d40-2e77-11ed-9a52-4b27bf417805.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.84.227 + 100.64.84.227 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 10.55.52.223 + 10.55.52.223 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1662532683 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f7f9d40-2e77-11ed-9a52-4b27bf417805 + + + diff --git a/graph/incidents_graphml/9/9f803fa0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9f803fa0-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..384567ae5e357db3994e5bcff4d1bb814ad02ec7 --- /dev/null +++ b/graph/incidents_graphml/9/9f803fa0-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.180 + 100.64.29.180 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.247.113 + 172.24.247.113 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 172.27.202.53 + 172.27.202.53 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f803fa0-0867-11ee-aafb-9397a5ec7d32 + + + INCIDENT_LINK + 1686495164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f803fa0-0867-11ee-aafb-9397a5ec7d32 + + + INCIDENT_LINK + 1686495164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9f803fa0-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/9/9f8c0890-3ea3-11ee-a794-3d0dc768f48a.graphml b/graph/incidents_graphml/9/9f8c0890-3ea3-11ee-a794-3d0dc768f48a.graphml new file mode 100644 index 0000000000000000000000000000000000000000..7f924858c70c6a922cdda17f831b20938cf409bb --- /dev/null +++ b/graph/incidents_graphml/9/9f8c0890-3ea3-11ee-a794-3d0dc768f48a.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.18.38.152 + 172.18.38.152 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.9.205 + 100.64.9.205 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1692458297 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9f8c0890-3ea3-11ee-a794-3d0dc768f48a + + + diff --git a/graph/incidents_graphml/9/9f8d5770-84c8-11ee-89b4-37c02fa13bd9.graphml b/graph/incidents_graphml/9/9f8d5770-84c8-11ee-89b4-37c02fa13bd9.graphml new file mode 100644 index 0000000000000000000000000000000000000000..8213d3c3d3e38df698796f9ac5cc90a7f26c0286 --- /dev/null +++ b/graph/incidents_graphml/9/9f8d5770-84c8-11ee-89b4-37c02fa13bd9.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.55.9 + 100.64.55.9 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1700170770 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9f8d5770-84c8-11ee-89b4-37c02fa13bd9 + + + diff --git a/graph/incidents_graphml/9/9fa5c900-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9fa5c900-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bc60cdb921ad3743989e9d12f01e3aeb3cc3e7a5 --- /dev/null +++ b/graph/incidents_graphml/9/9fa5c900-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.23.86.34 + 172.23.86.34 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.29.180 + 100.64.29.180 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495164 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9fa5c900-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/9/9fa6fa90-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/9/9fa6fa90-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..6d4de6b5a261644fb901ad6b15e07e5f0d8ece23 --- /dev/null +++ b/graph/incidents_graphml/9/9fa6fa90-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.25.222.10 + 172.25.222.10 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.127 + 100.64.10.127 + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703519 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9fa6fa90-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/9/9fae1fe0-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9fae1fe0-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..809f6a73916ad9a5673b9c0c5441cd01421a1ac8 --- /dev/null +++ b/graph/incidents_graphml/9/9fae1fe0-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.79.173 + 100.64.79.173 + ["Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.71.82 + 100.64.71.82 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9fae1fe0-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370395 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9fae1fe0-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/9/9fb83200-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9fb83200-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..804a0b63fd2a848f864840532aa5b9922a7ce896 --- /dev/null +++ b/graph/incidents_graphml/9/9fb83200-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.76.118 + 100.64.76.118 + ["Exploiting Host"] + 0.4375 + ["Precinct","Meraki"] + + + HOST + 100.64.73.72 + 100.64.73.72 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fb83200-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370395 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fb83200-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/9/9fbd6220-ed53-11ec-8964-796320a841f1.graphml b/graph/incidents_graphml/9/9fbd6220-ed53-11ec-8964-796320a841f1.graphml new file mode 100644 index 0000000000000000000000000000000000000000..faf1ff9f666f61f7633077b5884906430600bd2c --- /dev/null +++ b/graph/incidents_graphml/9/9fbd6220-ed53-11ec-8964-796320a841f1.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.28.218 + 100.64.28.218 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.70.228 + 100.64.70.228 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1655370395 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fbd6220-ed53-11ec-8964-796320a841f1 + + + INCIDENT_LINK + 1655370395 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fbd6220-ed53-11ec-8964-796320a841f1 + + + diff --git a/graph/incidents_graphml/9/9fbdddf0-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/9/9fbdddf0-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..034a9b02f606f00912f6c3cacaff27e249089873 --- /dev/null +++ b/graph/incidents_graphml/9/9fbdddf0-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.135.251.191 + 10.135.251.191 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.129 + 100.64.10.129 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703519 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9fbdddf0-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/9/9fc0cb10-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9fc0cb10-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cf5a1dd73a14d7a78e39d9f15d107f9be9f80afa --- /dev/null +++ b/graph/incidents_graphml/9/9fc0cb10-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.7.147 + 100.64.7.147 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + 9fc0cb10-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/9/9fceb4d0-0c38-11ee-9256-6d0394834f57.graphml b/graph/incidents_graphml/9/9fceb4d0-0c38-11ee-9256-6d0394834f57.graphml new file mode 100644 index 0000000000000000000000000000000000000000..96fd40871ac351d3e97b5e7867ae788194e7367b --- /dev/null +++ b/graph/incidents_graphml/9/9fceb4d0-0c38-11ee-9256-6d0394834f57.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.29.49 + 100.64.29.49 + ["Exploiting Host","Exploiting Target"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.33.161 + 100.64.33.161 + ["Exploiting Host","Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686914783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fceb4d0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fceb4d0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fceb4d0-0c38-11ee-9256-6d0394834f57 + + + INCIDENT_LINK + 1686914783 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fceb4d0-0c38-11ee-9256-6d0394834f57 + + + diff --git a/graph/incidents_graphml/9/9fd6e430-120d-11ef-818b-4176151696b3.graphml b/graph/incidents_graphml/9/9fd6e430-120d-11ef-818b-4176151696b3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..067886a4cedd006da77440845954b92bbf7c846b --- /dev/null +++ b/graph/incidents_graphml/9/9fd6e430-120d-11ef-818b-4176151696b3.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.10.131 + 100.64.10.131 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1715703519 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9fd6e430-120d-11ef-818b-4176151696b3 + + + diff --git a/graph/incidents_graphml/9/9fe78cf0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/9/9fe78cf0-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c6485e049c18b26b403692d70538eb3e46efab30 --- /dev/null +++ b/graph/incidents_graphml/9/9fe78cf0-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.22.127.96 + 172.22.127.96 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.7.147 + 100.64.7.147 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9fe78cf0-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/9/9fed67b0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9fed67b0-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..545a3b98a9cb150c0e527d7f59864dc47b78c444 --- /dev/null +++ b/graph/incidents_graphml/9/9fed67b0-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.86.42 + 100.64.86.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678139306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9fed67b0-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/9/9ff074f0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ff074f0-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..9e2588a831b5d3d93269a495bdc6b3729517d6f3 --- /dev/null +++ b/graph/incidents_graphml/9/9ff074f0-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.207.79.45 + 100.64.84.55 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.86.42 + 100.64.86.42 + ["Exploiting Host"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139306 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ff074f0-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/9/9ff25f40-22d3-11ef-b7cc-27d8681b231b.graphml b/graph/incidents_graphml/9/9ff25f40-22d3-11ef-b7cc-27d8681b231b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..c0e650d4323d00a1d5621066e65c72883e925649 --- /dev/null +++ b/graph/incidents_graphml/9/9ff25f40-22d3-11ef-b7cc-27d8681b231b.graphml @@ -0,0 +1,113 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.21.57.69 + 172.21.57.69 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","Windows Active Directory","ASA Firewall","Stealthwatch","Barracuda WAF"] + + + HOST + 100.64.1.138 + 100.64.1.138 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.89.240 + 100.64.89.240 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1717547778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ff25f40-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ff25f40-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ff25f40-22d3-11ef-b7cc-27d8681b231b + + + INCIDENT_LINK + 1717547778 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ff25f40-22d3-11ef-b7cc-27d8681b231b + + + diff --git a/graph/incidents_graphml/9/9ff270c0-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ff270c0-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..bf1c7969ea20155da6b2f4e9fb8a4f5bd2ba1d58 --- /dev/null +++ b/graph/incidents_graphml/9/9ff270c0-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.88.202 + 100.64.88.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + INCIDENT_LINK + 1678139306 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ff270c0-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/9/9ff3cae0-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/9/9ff3cae0-2885-11ee-ab6d-398d68629c7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..d1049b8718282ba6518ac3ccb337f5dba98cf31f --- /dev/null +++ b/graph/incidents_graphml/9/9ff3cae0-2885-11ee-ab6d-398d68629c7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.182.227 + 172.31.182.227 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.48.89 + 100.64.48.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690026487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9ff3cae0-2885-11ee-ab6d-398d68629c7b + + + diff --git a/graph/incidents_graphml/9/9ff57e00-bc68-11ed-b487-1b4dcbdf8241.graphml b/graph/incidents_graphml/9/9ff57e00-bc68-11ed-b487-1b4dcbdf8241.graphml new file mode 100644 index 0000000000000000000000000000000000000000..957d4fd8531fc7a4f5167246e7061dd9af1667ce --- /dev/null +++ b/graph/incidents_graphml/9/9ff57e00-bc68-11ed-b487-1b4dcbdf8241.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 10.113.78.104 + 10.113.78.104 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","ASA Firewall","Barracuda WAF"] + + + HOST + 100.64.88.202 + 100.64.88.202 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1678139306 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + 9ff57e00-bc68-11ed-b487-1b4dcbdf8241 + + + diff --git a/graph/incidents_graphml/9/9ff8a7e0-300f-11ee-bf6d-f1637ddc586f.graphml b/graph/incidents_graphml/9/9ff8a7e0-300f-11ee-bf6d-f1637ddc586f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..daeb82533f69f3414a1f333a58b56aaee560340b --- /dev/null +++ b/graph/incidents_graphml/9/9ff8a7e0-300f-11ee-bf6d-f1637ddc586f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.22.113 + 100.64.22.113 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.77 + 100.64.73.77 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki","Umbrella"] + + + INCIDENT_LINK + 1690855416 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + 9ff8a7e0-300f-11ee-bf6d-f1637ddc586f + + + diff --git a/graph/incidents_graphml/9/9ffb2e10-16e3-11ee-8363-57b2dccea5f8.graphml b/graph/incidents_graphml/9/9ffb2e10-16e3-11ee-8363-57b2dccea5f8.graphml new file mode 100644 index 0000000000000000000000000000000000000000..068a3bd02f704d2b0b89a80001c07620d51455a6 --- /dev/null +++ b/graph/incidents_graphml/9/9ffb2e10-16e3-11ee-8363-57b2dccea5f8.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.34.7 + 100.64.34.7 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.6.172 + 172.31.6.172 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1688087739 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + 9ffb2e10-16e3-11ee-8363-57b2dccea5f8 + + + diff --git a/graph/incidents_graphml/a/a000d370-d6a5-11ed-836d-79bb3a962e0f.graphml b/graph/incidents_graphml/a/a000d370-d6a5-11ed-836d-79bb3a962e0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..b05a6f8ba4fe3b717f0b2f525f44ed8336786d5d --- /dev/null +++ b/graph/incidents_graphml/a/a000d370-d6a5-11ed-836d-79bb3a962e0f.graphml @@ -0,0 +1,315 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.11.234 + 100.64.11.234 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.191.229 + 172.24.191.229 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.191 + 100.64.23.191 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 172.24.217.8 + 172.24.217.8 + ["Exploiting Target","Exploiting Host"] + 0.9208984375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.192 + 100.64.23.192 + ["Exploiting Target"] + 0.4375 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.193 + 100.64.23.193 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.23.194 + 100.64.23.194 + ["Exploiting Host"] + 0.578125 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + INCIDENT_LINK + 1681024236 + malicious + 0.9208984375 + 0.9208984375 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a000d370-d6a5-11ed-836d-79bb3a962e0f + + + diff --git a/graph/incidents_graphml/a/a00c5300-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a00c5300-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..f225ab73aa78add36d0fb26d1ca836bf0d7000be --- /dev/null +++ b/graph/incidents_graphml/a/a00c5300-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.67.44 + USER-0015-1486.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a00c5300-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/a/a00d7da0-d6a5-11ed-836d-79bb3a962e0f.graphml b/graph/incidents_graphml/a/a00d7da0-d6a5-11ed-836d-79bb3a962e0f.graphml new file mode 100644 index 0000000000000000000000000000000000000000..a5d81fa93c8cd7c16280b213c6d1b5f0851a292f --- /dev/null +++ b/graph/incidents_graphml/a/a00d7da0-d6a5-11ed-836d-79bb3a962e0f.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.16.233.43 + 172.16.233.43 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.15.80 + 100.64.15.80 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1681024236 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a00d7da0-d6a5-11ed-836d-79bb3a962e0f + + + diff --git a/graph/incidents_graphml/a/a018b800-2885-11ee-ab6d-398d68629c7b.graphml b/graph/incidents_graphml/a/a018b800-2885-11ee-ab6d-398d68629c7b.graphml new file mode 100644 index 0000000000000000000000000000000000000000..59c3b5d124db9ba02db2f3cdfec39199cbbc5566 --- /dev/null +++ b/graph/incidents_graphml/a/a018b800-2885-11ee-ab6d-398d68629c7b.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.48.89 + 100.64.48.89 + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.21.61.66 + 172.21.61.66 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1690026487 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a018b800-2885-11ee-ab6d-398d68629c7b + + + diff --git a/graph/incidents_graphml/a/a01e4bf0-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a01e4bf0-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..cfafbd7844ec07b033f41d6807b4bfd6f9eb984c --- /dev/null +++ b/graph/incidents_graphml/a/a01e4bf0-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.24.190 + 100.64.24.190 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638423 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a01e4bf0-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a02bc1e0-0867-11ee-aafb-9397a5ec7d32.graphml b/graph/incidents_graphml/a/a02bc1e0-0867-11ee-aafb-9397a5ec7d32.graphml new file mode 100644 index 0000000000000000000000000000000000000000..320fcc78e485fa4ba979d14a70855ac195ef3fe4 --- /dev/null +++ b/graph/incidents_graphml/a/a02bc1e0-0867-11ee-aafb-9397a5ec7d32.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.30.208.219 + 172.30.208.219 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.67.44 + USER-0015-1486.example.internal + ["Exploiting Host"] + 0.25 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1686495165 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Unprocessed + a02bc1e0-0867-11ee-aafb-9397a5ec7d32 + + + diff --git a/graph/incidents_graphml/a/a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2.graphml b/graph/incidents_graphml/a/a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adead07ec6ad0e6158e4c9f892a59b1ff2317adf --- /dev/null +++ b/graph/incidents_graphml/a/a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2.graphml @@ -0,0 +1,77 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.81.217 + 100.64.81.217 + ["Exploiting Host","Exploiting Target"] + 0.25 + ["Precinct","Meraki"] + + + HOST + 100.64.73.60 + 100.64.73.60 + ["Exploiting Target","Exploiting Host"] + 0.25 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1656543781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2 + + + INCIDENT_LINK + 1656543781 + malicious + 0.7 + 0.25 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Unprocessed + a02fa180-f7ff-11ec-9c0d-cfd14a23bdb2 + + + diff --git a/graph/incidents_graphml/a/a0304d50-5277-11ee-99e4-0dae236ad26e.graphml b/graph/incidents_graphml/a/a0304d50-5277-11ee-99e4-0dae236ad26e.graphml new file mode 100644 index 0000000000000000000000000000000000000000..97679de6a09f5187cb0c2f1d1a98156d4dc6eee2 --- /dev/null +++ b/graph/incidents_graphml/a/a0304d50-5277-11ee-99e4-0dae236ad26e.graphml @@ -0,0 +1,63 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 172.31.101.1 + 172.31.101.1 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + HOST + 100.64.24.190 + 100.64.24.190 + ["Exploiting Target","Exploiting Host"] + 0.71875 + ["Precinct","ASA Firewall"] + + + INCIDENT_LINK + 1694638423 + malicious + 0.71875 + 0.71875 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Target","Exploiting Host"] + complete-mission + Disrupted + a0304d50-5277-11ee-99e4-0dae236ad26e + + + diff --git a/graph/incidents_graphml/a/a03685c0-238e-11ee-8f53-17c8a7373bd3.graphml b/graph/incidents_graphml/a/a03685c0-238e-11ee-8f53-17c8a7373bd3.graphml new file mode 100644 index 0000000000000000000000000000000000000000..adf0cd0ecd9b9c09f352df0d508b3308f076608e --- /dev/null +++ b/graph/incidents_graphml/a/a03685c0-238e-11ee-8f53-17c8a7373bd3.graphml @@ -0,0 +1,293 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + HOST + 100.64.40.51 + 100.64.40.51 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.104 + USER-0015-1635.example.internal + ["Exploiting Host","Exploiting Target"] + 0.71875 + ["Precinct","Umbrella","Meraki"] + + + HOST + 100.64.72.105 + 100.64.72.105 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.55.48 + 100.64.55.48 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.71.237 + 100.64.71.237 + ["Exploiting Target","Exploiting Host"] + 0.7890625 + ["Precinct","Meraki","Umbrella"] + + + HOST + 100.64.37.94 + 100.64.37.94 + ["Exploiting Host","Exploiting Target"] + 0.7890625 + ["Precinct","Meraki"] + + + HOST + 100.64.72.106 + 100.64.72.106 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + HOST + 100.64.15.227 + 100.64.15.227 + ["Exploiting Host"] + 0.578125 + ["Precinct","Meraki"] + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + + INCIDENT_LINK + 1689480597 + malicious + 0.7890625 + 0.7890625 + Data Theft + ["T1190","T1041","T1567"] + ["TA0001","TA0002","TA0009","TA0010"] + ["Exploiting Host","Exploiting Target"] + complete-mission + Disrupted + a03685c0-238e-11ee-8f53-17c8a7373bd3 + + +